{"id":13751,"date":"2023-03-13T08:39:44","date_gmt":"2023-03-13T08:39:44","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=13751"},"modified":"2023-03-13T08:45:43","modified_gmt":"2023-03-13T08:45:43","slug":"emotet-has-resumed-activity","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/emotet-has-resumed-activity\/","title":{"rendered":"Emotet Has Resumed Activity after a Three-Month Break"},"content":{"rendered":"<p><h4>Experts noticed that this week Emotet resumed its activity and after a three-month &#8220;rest&#8221; began to send malicious spam again. So far, information security specialists have not found any additional payloads.<\/h4>\n<\/p>\n<p>It looks like the malware is just collecting data for future spam campaigns.<\/p>\n<p>Let me remind you that we also wrote that <a href=\"\/blogs\/emotet-malware-operators-found-a-bug\/\"><strong>Emotet<\/strong> Malware Operators Found a Bug in Their Bootloader<\/a>.<\/p>\n<p>The resumption of malware activity was reported by <strong><a rel=\"noopener noreferrer nofollow\" target=\"_blank\" href=\"https:\/\/cofense.com\/blog\/emotet-sending-malicious-emails-after-three-month-hiatus\/\">Cofense<\/a><\/strong> analysts and specialists from the <strong><a rel=\"noopener noreferrer nofollow\" target=\"_blank\" href=\"https:\/\/twitter.com\/Cryptolaemus1\/status\/1633099154623803394\">Cryptolaemus<\/a><\/strong> group, which includes more than 20 experts from around the world, <a target=\"_blank\" href=\"https:\/\/howtofix.guide\/cryptolaemus-group-of-enthusiasts-independently-fights-with-emotet-malware\/\" rel=\"noopener nofollow\">who united in 2018 for a common goal &#8211; to fight Emotet<\/a>.<\/p>\n<p>The researchers recalled that the <a href=\"\/blogs\/emotet-botnet-resumed-activity\/\">last Emotet spam campaign was observed in November 2022<\/a>, and then spamming lasted only two weeks. Now the malware has continued to recover and collects new credentials for use, as well as stealing information from address books for targeting.<\/p>\n<p>This time, instead of using chained response emails, as in the previous campaign, the attackers are using emails that mimic various invoices.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/03\/attackers-are-using-emails.jpg\" alt=\"Emotet has resumed activity\" title=\"\"><\/p>\n<p>ZIP archives containing intentionally &#8220;bloated&#8221; Word documents larger than 500 MB are attached to such emails. Documents are deliberately filled with unused data to make the files bigger and harder for antivirus solutions to scan and detect malware.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/03\/Document-is-Protected.jpg\" alt=\"Emotet has resumed activity\" title=\"\"><\/p>\n<p>In fact, such documents contain many macros that download the Emotet loader as a DLL from compromised sites (mostly hacked <strong>WordPress<\/strong> blogs). After downloading, the malware will be saved in a folder with a random name in %LocalAppData% and launched using <strong>regsvr32.exe<\/strong>.<\/p>\n<p>At the same time, the malware DLL file is also deliberately increased to 526 MB in order to prevent security software from identifying the file as malicious. <a rel=\"noopener noreferrer nofollow\" target=\"_blank\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/emotet-malware-attacks-return-after-three-month-break\/\">As noted by <strong>Bleeping Computer<\/strong><\/a>, this method of evading detection works great: according to <strong><a rel=\"noopener noreferrer nofollow\" target=\"_blank\" href=\"https:\/\/www.virustotal.com\/gui\/file\/1c9be74d8f870d1218685a86a51ffb01d96524a742fe9f610eb07d9c345e3961\">VirusTotal<\/a><\/strong>, so far the malware has been detected by only one provider of security solutions out of 64. At the same time, this provider defines the threat only as <strong>Malware.SwollenFile<\/strong>.<\/p>\n<p>Once launched on an infected device, Emotet will run in the background, waiting for commands from its operators, which will likely result in additional payloads being installed. Although Cofense experts note that they have not yet observed any additional payloads, and now the malware seems to be simply collecting data for future spam campaigns.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Experts noticed that this week Emotet resumed its activity and after a three-month &#8220;rest&#8221; began to send malicious spam again. So far, information security specialists have not found any additional payloads. It looks like the malware is just collecting data for future spam campaigns. Let me remind you that we also wrote that Emotet Malware [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":13755,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[67,28,10],"class_list":{"0":"post-13751","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-emotet","9":"tag-malware","10":"tag-spam"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/03\/Emotet-has-resumed-activity.jpg","author_info":{"display_name":"Vladimir Krasnogolovy","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/krasnogolovy\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/13751","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=13751"}],"version-history":[{"count":1,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/13751\/revisions"}],"predecessor-version":[{"id":13754,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/13751\/revisions\/13754"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/13755"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=13751"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=13751"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=13751"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}