Win32/Emotet [Threat Name] go to Threat
Win32/Emotet.BK [Threat Variant Name]
Category | trojan |
Size | 204800 B |
Aliases | Trojan.Emotet (Symantec) |
Trojan-Banker.Win32.Emotet.aqie (Kaspersky) | |
Trojan:Win32/Occamy.C (Microsoft) |
Short description
Win32/Emotet.BK serves as a backdoor. It can be controlled remotely.
Installation
When executed, the trojan may create copies of itself using the following filenames:
- %system%\%variable1%%variable2%.exe
- %localappdata%\Microsoft\Windows\%variable1%%variable2%.exe
The %variable1%, %variable2% is one of the following strings:
- account
- als
- batch
- batt
- bthpan
- capture
- cards
- cmn
- connect
- cosine
- crash
- ctx
- defrag
- extid
- exts
- fault
- fondue
- genral
- hyper
- init
- iwamreg
- jit
- lanes
- lso
- markers
- mci
- mcr
- mdmaus
- mrm
- mspthrd
- nevada
- nla
- pack
- pix
- prxy
- quota
- scalar
- serif
- shared
- sharpen
- shlp
- shv
- sls
- spi
- square
- swim
- sync
- table
- tag
- tcp
- texture
- tiny
- tip
- tlnt
- utilman
- viewer
- vsgd
- wait
- watch
- wmistr
- wscapi
- wsd
- wwa
- xinput
The trojan may set the following Registry entries:
- [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
- "%variable1%%variable2%" = "%localappdata%\Microsoft\Windows\%variable1%%variable2%.exe"
The trojan may register itself as a system service using the following name:
- %variable1%%variable2%
This causes the trojan to be executed on every system start.
After the installation is complete, the trojan deletes the original executable file.
Information stealing
Win32/Emotet.BK is a trojan that steals sensitive information.
The following information is collected:
- computer name
- volume serial number
- operating system version
- list of running processes
The trojan attempts to send gathered information to a remote machine.
Other information
The trojan acquires data and commands from a remote computer or the Internet.
The trojan contains a list of (40) IP addresses. The HTTP, HTTPS protocol is used in the communication.
The network communication with remote computer/server is encrypted. The RSA, AES encryption algorithm is used.
It can execute the following operations:
- download files from a remote computer and/or the Internet
- run executable files
- update itself to a newer version
- stop itself for a certain time period
The trojan may delete the following files:
- %systemr%\%variable1%%variable2%.exe:Zone.Identifier
- %localappdata%\Microsoft\Windows\%variable1%%variable2%.exe:Zone.Identifier