TROJ_EMOTET.IJW
Win32/Emotet.AB (ESET)
Windows
![](/vinfo/imgFiles/legend.jpg)
Threat Type: Trojan
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
However, as of this writing, the said sites are inaccessible.
TECHNICAL DETAILS
Arrival Details
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Installation
This Trojan drops the following copies of itself into the affected system and executes them:
- %Application Data%\Identities\{random filename}.exe
(Note: %Application Data% is the Application Data folder, where it usually is C:\Documents and Settings\{user name}\Application Data on Windows 2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\Users\{user name}\AppData\Roaming on Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32- and 64-bit), Windows 8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.)
Autostart Technique
This Trojan adds the following registry entries to enable its automatic execution at every system startup:
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
{random filename}.exe = "%Application Data%\Identities\{random filename}.exe"
Other System Modifications
This Trojan adds the following registry keys:
HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications
HKEY_CURRENT_USER\Software\Netscape\
5.0\682a6c2d\w682a6c2d
It adds the following registry entries:
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings
GlobalUserOffline = "0"
Other Details
This Trojan connects to the following possibly malicious URL:
- http://{BLOCKED}.{BLOCKED}.26.52:8080/682a6c2d/2f59ea79/
- http://{BLOCKED}.{BLOCKED}.86.207:8080/682a6c2d/2f59ea79/
- http://{BLOCKED}.{BLOCKED}.123.186:8080/682a6c2d/2f59ea79/
- http://{BLOCKED}.{BLOCKED}.170.164:8080/682a6c2d/2f59ea79/
- http://{BLOCKED}.{BLOCKED}.220.50:8080/682a6c2d/2f59ea79/
- http://{BLOCKED}.{BLOCKED}.17.185:8080/682a6c2d/2f59ea79/
- http://{BLOCKED}.{BLOCKED}.199.119:8080/682a6c2d/2f59ea79/
- http://{BLOCKED}.{BLOCKED}.174.144:8080/682a6c2d/2f59ea79/
- http://{BLOCKED}.{BLOCKED}.249.53:8080/682a6c2d/2f59ea79/
- http://{BLOCKED}.{BLOCKED}.59.161:8080/682a6c2d/2f59ea79/
- http://{BLOCKED}.{BLOCKED}.169.146:8080/682a6c2d/2f59ea79/
- http://{BLOCKED}.{BLOCKED}.162.180:8080/682a6c2d/2f59ea79/
- http://{BLOCKED}.{BLOCKED}.111.17:8080/682a6c2d/2f59ea79/
- http://{BLOCKED}.{BLOCKED}.1.22:8080/682a6c2d/2f59ea79/
- http://{BLOCKED}.{BLOCKED}.231.167:8080/682a6c2d/2f59ea79/
- http://{BLOCKED}.{BLOCKED}.54.24:8080/682a6c2d/2f59ea79/
- http://{BLOCKED}.{BLOCKED}.99.214:8080/682a6c2d/2f59ea79/
- http://{BLOCKED}.{BLOCKED}.59.191:8080/682a6c2d/2f59ea79/
- http://{BLOCKED}.{BLOCKED}.110.43:8080/682a6c2d/2f59ea79/
- http://{BLOCKED}.{BLOCKED}.24.35:8080/682a6c2d/2f59ea79/
- http://{BLOCKED}.{BLOCKED}.174.192:8080/682a6c2d/2f59ea79/
- http://{BLOCKED}.{BLOCKED}.213.92:8080/682a6c2d/2f59ea79/
However, as of this writing, the said sites are inaccessible.