<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p style="text-align: center;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;">What was originally designed to be a banking Trojan has now become a versatile malicious code used to deploy a massive botnet, and is considered one of the most dangerous active malware families today. </span></p> <p style="text-align: center;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;">In an alert published by the U.S. Department of Homeland Security last year, Emotet was described as “among the most costly and destructive malware affecting state, local, tribal, and territorial (SLTT)." Emotet was extremely active in the first half of 2019, until a recent two-month period when the malware family went under the radar (rumor has it that the sudden disappearance was to allow for maintenance and upgrades). Last week, the malware re-emerged with <a href="https://www.bankinfosecurity.com/emotet-botnet-shows-signs-revival-a-12964">renewed activity spotted by Cofense researchers</a>.</span></p> <p><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;"><!--more--></span></p> <p><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;">Our Security Research Team has come across endless Emotet indicators of compromise, which comes as no surprise considering how widespread the malware’s activity is. In addition to automated ThreatSTOP Emotet IOC feeds, the team reviews some Emotet indicators posted on sharing platforms in an in-depth analysis, to ensure reliability and to search for additional malicious indicators, as many Emotet IOCs have been found related to additional malicious activity in the past.</span></p> <p><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;">In May, an Emotet sample was <a href="https://app.any.run/tasks/74db77ed-01a9-4d8d-92a2-28a79270ff81/">analyzed and posted</a> on Any Run, a malware analysis platform. The analysis was <a href="https://twitter.com/Cryptolaemus1/status/1130386458555092992">posted on Twitter</a> by a team specializing in Emotet research, and it came to our attention via <a href="https://otx.alienvault.com/pulse/5ce2736013c9a337b5794f47">AlienVault’s OTX</a>. so they chose to analyze the IOCs posted in the sample analysis, discovering additional malicious IOCs. In this use case, we will show how our analysis team used free open-source analysis tools to analyze an IP from the Emotet reports - 108[.]179[.]217[.]238.</span></p> <p><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;">To start off, a simple search on VirusTotal shows that the IP is related to a ton of malicious activity, seen to be downloading and communicating with a number of malicious files. By pressing on each file icon on VT, analysts can see the malware type, in this case ranging from Emotet to Valyria downloader.</span></p> <p><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;"><img src="https://info.threatstop.com/hubfs/image-39.png"></span></p> <p style="margin-bottom: 6pt; font-size: 16px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif; color: #545454;">Another useful feature of the VirusTotal relations graph is the related URLs. The graph displays the URLs deemed malicious by industry-leading security companies, and pressing on the “Show Node List” button on the left-side menu uncovers a convenient list of the malicious URLs. On this IP, two domains showed up in the list that were not mentioned in the original reports - homedepot-managepayment[.]com and orders-dressbarn[.]com, the latter showing activity a few days before the posts were released.</span></p> <p style="margin-bottom: 6.0pt;">&nbsp;</p> <p style="margin-bottom: 6.0pt;"><span style="font-size: 11pt; font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif; color: black;"><img src="https://info.threatstop.com/hubfs/image-40.png"></span></p> <p>&nbsp;</p> <p style="margin-bottom: 6pt; font-size: 16px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif; color: #000000;">Using the visual relations display on VirusTotal, our analysts were able to find an additional, unknown malicious domain in a matter of seconds. Often, a simple search like this can yield many more indicators, which can in turn lead to a deeper relations analysis.</span></p> <p style="margin-bottom: 6pt; font-size: 12px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif; color: #000000;">&nbsp;</span></p> <p style="margin-bottom: 6pt; text-align: center; font-size: 12px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif; color: #000000;"><strong><span style="font-size: 16px;">Want to hear more about the tools and platforms mentioned in this use case?</span></strong> </span></p> <p style="margin-bottom: 6pt; font-size: 12px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif; color: #000000; font-size: 16px;">Check out our previous posts in this series: </span></p> <p style="margin: 0in 0in 0.0001pt; font-size: 12px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif; font-size: 16px; color: #000000;">Part 1: <a href="https://blog.threatstop.com/free-open-source-ioc-analysis-tools-why-use-iocs" style="color: #000000;">Why use IOCs?</a></span></p> <p style="margin: 0in 0in 0.0001pt; font-size: 12px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif; font-size: 16px; color: #000000;">Part 2: <a href="https://blog.threatstop.com/threat-exchanges-ioc-sharing" style="color: #000000;">Threat Exchanges and IOC Sharing</a></span></p> <p style="margin: 0in 0in 0.0001pt; font-size: 12px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif; font-size: 16px; color: #000000;">Part 3: <a href="https://blog.threatstop.com/analyzing-threat-infrastructure" style="color: #000000;">Analyzing Threat Infrastructure</a></span></p> <p style="margin: 0in 0in 0.0001pt; font-size: 12px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif; font-size: 16px; color: #000000;">Part 4: <a href="https://blog.threatstop.com/enrichments-connecting-the-dots" style="color: #000000;">Enrichments and Connecting the Dots</a></span></p> <p style="margin: 0in 0in 0.0001pt; font-size: 12px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif; color: #000000; font-size: 16px;">&nbsp;</span></p> <p style="text-align: center; font-size: 12px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif; color: #000000; font-size: 16px;"><strong>Want to see more IOC analysis use cases?</strong></span></p> <p style="font-size: 12px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif; font-size: 16px; color: #000000;">Check out our recent analyses posted by our Security Research Team, using similar analysis concepts – <a href="https://blog.threatstop.com/riltok-mobile-banking-trojan-targets" style="color: #000000;">Riltok Mobile Banking Trojan Analysis</a>, <a href="https://blog.threatstop.com/over-120-malicious-domains-discovered-in-analysis-on-new-roaming-mantis-campaign" style="color: #000000;">Roaming Mantis Cryptomining Malware Analysis</a>.</span></p> <p>&nbsp;</p> <p style="text-align: center;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif; font-size: 16px;"><strong>If you haven't yet, subscribe to our blog so you don't miss out on this series and other posts from our experts around all things cyber security. For more information about ThreatSTOP and proactively using threat intelligence, check us out below. </strong></span></p> <p style="text-align: center;">&nbsp; &nbsp; &nbsp; &nbsp;</p></span>