Question

In: Computer Science

How does Emotet establish connection to the C&C infrastructure?

How does Emotet establish connection to the C&C infrastructure?

Solutions

Expert Solution

Emotet gets an initial foothold on a victim machine or network by sending an email containing either a malicious link that leads to a downloader document or that has a malicious document attached. Anti-analysis tactics have been present in Emotet since at least 2015 and, in 2018, Emotet’s payload consists of a packed file containing the main component and an anti-analysis module. The anti-analysis module performs multiple checks to ensure it is not being run on a malware research machine, then loads the main component. Either PowerShell or JavaScript is used to download the Trojan, which delivers a packed payload file to the victim machine. Once on a machine, the latest version of Emotet:

  1. Moves itself to its preferred directory
  2. Creates a LNK file pointing to itself in the start-up folder
  3. Collects victim machine information and sends it to the C&C server

It can then download any new payloads from the C&C server, and execute them. Emotet can download an updated version of itself, or any other threat. Existing versions of Emotet download modules from the C&C server that include:

  • Banking module: This module intercepts network traffic from the browser to steal banking details entered by the user. This is what gave Trojan.Emotet its reputation as a banking Trojan.
  • Email client infostealer module: This module steals email credentials from email client software.
  • Browser infostealer module: This module steals information such as browsing history and saved passwords.
  • PST infostealer module: This module reads through Outlook’s message archives and extracts the sender names and email addresses of the messages, presumably to use for spamming.

All information stolen by these modules is sent to the C&C server. Emotet also has a DDoS module that can add the infected machine to a botnet to carry out DDoS attacks.


Related Solutions

Your current infrastructure includes an internet connection, which is connected to the ISP Router, connected to...
Your current infrastructure includes an internet connection, which is connected to the ISP Router, connected to the firewall, connected to the network switch. Within the network you have an online store, a web server that provides internet information for employees only as well a file server that is used to save pet pictures of customers. More Information -Online Store – HP Procurve server – average transactions completed – 1500 per day. -Web Server – Dell EMC server - Portal server...
What is the NIST "Framework for Improving Critical Infrastructure Cybersecurity" and how does it relate to...
What is the NIST "Framework for Improving Critical Infrastructure Cybersecurity" and how does it relate to our Textbook Chapter 4 content? Also, provide an example of a NIST Guideline and an example of a NIST Best Practice; how could you apply those examples you identified to your use of the Internet? Your job is to read the Assignment Document Executive Summary Assignment Document: http://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214.pdf See chapter 4 from This book security + guide to network security fundamentals
How does investment in capital goods and infrastructure contribute to economic growth? How could the omission...
How does investment in capital goods and infrastructure contribute to economic growth? How could the omission of net exports from GDP overstate production? Or understate it? How will a sustained appreciation of the U.S. dollar over time likely affect U.S. net exports? Assume that the United States raises tariffs on products imported from other countries. What effect will this U.S. trade policy have in the short run if other nations do not change their policy? What effect will this policy...
If i were to propose a change in my company's information security infrastructure, how does that...
If i were to propose a change in my company's information security infrastructure, how does that proposal get processed up the corporate hierarchy? For example, does the proposal reach the VP of IT first or the VP of Security?
How does the axon of a neuron establish resting potential? Explain the roles of the three...
How does the axon of a neuron establish resting potential? Explain the roles of the three proteins. Where are ions?
What does emotion mean? What is the connection between how emotions are manifested and interpreted and...
What does emotion mean? What is the connection between how emotions are manifested and interpreted and culture? (4 Points) 400 words
General Questions (short simple answers please) 1. What is the connection(relationship) between properties right and infrastructure?...
General Questions (short simple answers please) 1. What is the connection(relationship) between properties right and infrastructure? 2. How to safeguard the technical integrity (reliability, safety)of local energy systems?Who is responsible? How to allocate property rights? 3. How do institutions (‘rules’) influence the economic allocation process?
How does our Health Care Organization establish and update patient management protocols?
How does our Health Care Organization establish and update patient management protocols?
How does the government establish the best price to charge for public goods? (Public goods are...
How does the government establish the best price to charge for public goods? (Public goods are goods that are supplied by the government)
explain what a forensic anthropologist does, how are they able to establish the biological profile, what...
explain what a forensic anthropologist does, how are they able to establish the biological profile, what else are they able to tell about an individual from the skeleton?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT