Trojan.W97M.EMOTET.JKCC

 Analysis by: Jay Garcia

 ALIASES:

Trojan-Downloader.VBA.Emotet (Ikarus); W97M/Downloader.ip (NAI)

 PLATFORM:

Windows

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Trojan

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

  TECHNICAL DETAILS

File Size:

198,618 bytes

File Type:

DOC

Memory Resident:

No

Initial Samples Received Date:

05 Dec 2019

Arrival Details

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Installation

This Trojan drops and executes the following files:

  • %User Profile%\962.exe

(Note: %User Profile% is the current user's profile folder, which is usually C:\Documents and Settings\{user name} on Windows 2000(32-bit), XP, and Server 2003(32-bit), or C:\Users\{user name} on Windows Vista, 7, 8, 8.1, 2008(64-bit), 2012(64-bit) and 10(64-bit).)

It adds the following processes:

  • powershell -w hidden -en {Base-64 encoded}

Other Details

This Trojan connects to the following possibly malicious URL:

  • https://{BLOCKED}yinfotech.xyz/wp-admin/tm4csxd9/
  • http://www.{BLOCKED}lfa.com/wp-content_/cgc1i5o9169/
  • https://{BLOCKED}engbao.com/wp-includes/mmm6z2/
  • https://{BLOCKED}litymanagement.net/wp-content/vrmfs6968/
  • http://{BLOCKED}iodev1.com/nubilt.subsiliodev1.com/k90en2164/