IMPORTANT ANNOUNCEMENT: On May 6, 2024, Carbon Black User eXchange (UeX) and Case Management will move to a new platform!
The Community will be in read-only mode starting April 19th, 7:00 AM PDT. Check out the blog post!
You will still be able to use the case portal to create and interact with your support cases until the transition, view more information here!

TAU-TIN - Emotet Banking Trojan

TAU-TIN - Emotet Banking Trojan

Summary

First discovered back in 2014, Emotet has made waves in the security world due to the way it seeks to target and exploit the banking industry. Earlier this year, the TAU team reported on a spike in Emotet activity. Since then it was seen in various small campaigns. However, this week we saw massive Emotet campaigns starting with multiple types of malware payloads such as Trickbot. Coincidentally, this recent surfacing of Emotet appears to have started on Guy Fawkes Night, November 5th. The last sizable spike observed on this scale was around one month prior. For this latest round of Emotet, there are effectively two active campaigns, and each have the ability to supply different payloads.

The TAU team at Carbon Black always strive to actively work with the InfoSec community. With the recent flurry of Emotet activity observed in the wild, a researcher in the community collated a list of the two active campaigns and their associated list of IOC’s for public consumption. Although the extensive list of IOC’s can be directly accessed from the sites referenced at the end of this notification, the TAU team believe that it would be highly beneficial to share this among our customers and partners for added visibility.


Credits:

Special thanks to Joseph Roosen (@JRoosen) for contributing the following:

https://pastebin.com/p8h0PwNK

This is a post contributed to by Andrew Costis, Swee Lai Lee, and myself.

Labels (1)
0 Kudos
Article Information
Author:
Creation Date:
‎03-05-2019
Views:
1621