April 21, 2020 By Shane Schick 2 min read

Emotet has returned with additional modules that have been specifically designed to improve the malware’s evasion capabilities, a cybersecurity researcher warned.

In a Twitter thread this past Saturday, IT security expert Marcus Hutchins, known as MalwareTech, said botnets that have been dormant for several months have been reactivated.

One botnet he described as E2, for example, has a module designed to steal email data, while another targets system credentials. Although it originally emerged as a banking Trojan akin to Trickbot and has already been rewritten several times before, Hutchins noted Emotet appears to have undergone a complete overhaul.

Hashbusting Comes Into Play

Among the techniques embedded into botnet E2’s modules is hashbusting. By making sure each malware’s file hash looks different on every system it infects, it becomes more difficult to track it, Hutchins explained.

The cybercriminals behind the variant have also made it simpler to mutate the malware by obfuscating code flow via a state machine, he added.

This means a randomized state value can control the flow of code blocks. They are placed in an arbitrary manner, increasing the challenges for security leaders and their teams. The malware’s authors achieve this by flattening the branches into nested loops.

All this means whoever updated the malware may be getting ready to launch an attack campaign, Hutchins concluded.

Emotet has emerged as a popular tool for hackers. Earlier this month, Microsoft reported an attack where the malware brought down an entire network. In February, another variant was using wireless local area networks (WLANs) as a distribution method.

Protect Yourself From Emotet Variants

Like many similar cyberthreats, Emotet has largely been driven by phishing emails that trick victims into clicking on a link that launches the malware.

While security awareness training can help here, IT security teams can improve their odds of detecting suspicious activity by using the logging and alerting capabilities of a security information and event management (SIEM) solution. Deploying multifactor authentication (MFA) is another best practice worth applying.

More from

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today