{"id":91068,"date":"2022-10-18T12:15:52","date_gmt":"2022-10-18T06:45:52","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=91068"},"modified":"2023-06-17T16:46:09","modified_gmt":"2023-06-17T11:16:09","slug":"a-deep-dive-into-new-64-bit-emotet-modules","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/a-deep-dive-into-new-64-bit-emotet-modules\/","title":{"rendered":"A DEEP DIVE INTO NEW 64 BIT EMOTET MODULES"},"content":{"rendered":"<p><a href=\"https:\/\/blogs.quickheal.com\/what-is-emotet\/\">Emotet<\/a> is usually delivered by SPAM campaigns containing document files. This self-propagating Trojan is a downloader malware that typically downloads and executes additional payloads. Around Jan 2021, Emotet\u2019s operations were reportedly shut down. However, it has shown its appearance again by the end of 2021. In recent months, Emotet seems to have shifted to 64 bit. This blog will focus on analyzing the new variant and its differences from the previous cosmetic versions.<\/p>\n<h3><strong>ANALYSIS (Latest variant) and Differences from previous versions<\/strong><strong>:<\/strong><\/h3>\n<p>Let us analyse the latest variant of Emotet having MD5 da045fce83afdcb9920a0a38b279d33d. Here, we can easily find that the first export function is being used.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-91070\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/10\/3.png\" alt=\"\" width=\"604\" height=\"451\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/3.png 604w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/3-300x224.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/3-522x390.png 522w\" sizes=\"(max-width: 604px) 100vw, 604px\" \/><\/p>\n<p style=\"text-align: left;\"><strong><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Fig: 1 DLL export functions (64bit latest)<\/em><\/strong><\/p>\n<p>The below image shows a Delphi compiled file having high entropy in the resource section having encrypted data.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-91069\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/10\/2.png\" alt=\"\" width=\"750\" height=\"447\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/2.png 750w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/2-300x179.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/2-650x387.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/2-250x150.png 250w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>\u00a0 \u00a0 \u00a0Fig: 2 Resource encrypted data<\/em><\/strong><\/p>\n<p>Given below is an image containing data stored in variables. These values are copied onto the stack.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-91071\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/10\/4.png\" alt=\"\" width=\"920\" height=\"323\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/4.png 920w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/4-300x105.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/4-650x228.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/4-768x270.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/4-789x277.png 789w\" sizes=\"(max-width: 920px) 100vw, 920px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Fig: 3<\/em><\/strong> <strong><em>Encrypted Data stored as variables<\/em><\/strong><\/p>\n<p>This data is decrypted into shell code in the virtually allocated memory, as shown in the image below:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-91091\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/10\/19.png\" alt=\"\" width=\"925\" height=\"321\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/19.png 925w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/19-300x104.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/19-650x226.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/19-768x267.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/19-789x274.png 789w\" sizes=\"(max-width: 925px) 100vw, 925px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Fig: 4<\/em><\/strong><em> <strong>Decryption loop<\/strong><\/em><\/p>\n<h3><strong>Decrypted shell code<\/strong><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-91092\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/10\/20.png\" alt=\"\" width=\"693\" height=\"113\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/20.png 693w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/20-300x49.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/20-650x106.png 650w\" sizes=\"(max-width: 693px) 100vw, 693px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Fig: 5 Decrypted shell code<\/em><\/strong><\/p>\n<p>This shellcode loads the DLL and APIs to be used further.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-91093\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/10\/21.png\" alt=\"\" width=\"925\" height=\"320\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/21.png 925w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/21-300x104.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/21-650x225.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/21-768x266.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/21-789x273.png 789w\" sizes=\"(max-width: 925px) 100vw, 925px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Fig: 6 shellcode loads the DLL and APIs<\/em><\/strong><\/p>\n<p>The encrypted data in the resource section is now decrypted and forms a PE file. Given below is the <a href=\"https:\/\/blogs.quickheal.com\/decryption-tool-crysisxtbl-ransomware\/\">decryption loop<\/a> related to the same.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-91094\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/10\/22.png\" alt=\"\" width=\"916\" height=\"193\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/22.png 916w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/22-300x63.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/22-650x137.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/22-768x162.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/22-789x166.png 789w\" sizes=\"(max-width: 916px) 100vw, 916px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Fig:<\/em><\/strong><strong><em> 7 Decryption loop<\/em><\/strong><\/p>\n<p>Given below is the decrypted inner file<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-91095\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/10\/23.png\" alt=\"\" width=\"672\" height=\"210\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/23.png 672w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/23-300x94.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/23-650x203.png 650w\" sizes=\"(max-width: 672px) 100vw, 672px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Fig:<\/em><\/strong><strong><em> 8 Decrypted inner file<\/em><\/strong><\/p>\n<p>This decrypted inner file is moved to another virtually allocated memory without PE Header. This memory is virtually protected.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-91096\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/10\/24.png\" alt=\"\" width=\"685\" height=\"189\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/24.png 685w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/24-300x83.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/24-650x179.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/24-304x84.png 304w\" sizes=\"(max-width: 685px) 100vw, 685px\" \/><\/p>\n<p style=\"text-align: center;\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0<strong>Fig: 9 File without PE header<\/strong><\/em><\/p>\n<p>Let us now explore the inner DLL. This has only one export function.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-91097\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/10\/25.png\" alt=\"\" width=\"726\" height=\"385\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/25.png 726w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/25-300x159.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/25-650x345.png 650w\" sizes=\"(max-width: 726px) 100vw, 726px\" \/><\/p>\n<p><strong><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Fig:<\/em><\/strong><strong><em> 10 Inner DLL\u00a0<\/em><\/strong><\/p>\n<p>This Dll is executed by calling the loader Dll\u2019s 1<sup>st<\/sup> export, which indirectly calls the inner Dlls 1<sup>st <\/sup>export function.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-91098\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/10\/26.png\" alt=\"\" width=\"817\" height=\"371\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/26.png 817w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/26-300x136.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/26-650x295.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/26-768x349.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/26-789x358.png 789w\" sizes=\"(max-width: 817px) 100vw, 817px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Fig: 11 Dlls 1<sup>st <\/sup>export function.<\/em><\/strong><\/p>\n<p>Here we witness that the highlighted statement [rsp+20] points to Inner DLL&#8217;s 1st export, showed in the above figure (Function RVA from CFF)<\/p>\n<p>This DLL uses Control Flow flattening and API hashing to make reverse engineering difficult.<\/p>\n<p>In this technique, the code is flattened by several instructions placed inside a loop within a single switch statement that controls the program flow.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-91099\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/10\/27.png\" alt=\"\" width=\"816\" height=\"313\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/27.png 816w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/27-300x115.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/27-650x249.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/27-768x295.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/27-789x303.png 789w\" sizes=\"(max-width: 816px) 100vw, 816px\" \/><\/p>\n<p><strong><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Fig:<\/em><\/strong><strong><em> 12 Control Flow Flattening Technique<\/em><\/strong><\/p>\n<p>It creates the copy of the loader dll (MD5:da045fce83afdcb9920a0a38b279d33d) with a random name in %Appdata% inside a random named folder and subsequently executes from that location.<\/p>\n<p>By setting up a breakpoint on\u00a0<strong>jmp rax<\/strong>, we could fetch all the C2s and the APIs, which are decrypted runtime (present hardcoded inside the file) used in the entire communication.<\/p>\n<p>These new Emotet samples use Bcrypt cryptography functions, which are part of bcrypt.dll. The earlier variants used advapi32.dll Crypt functions.<\/p>\n<p>The malware collects information such as Computer name, Volume ID, Version info, Execution path, etc., and sends it to C2. This data transmitted is encrypted via ECC (Elliptic Curve Cryptography) Algorithm. In the earlier samples, RSA was used.<\/p>\n<p>Looking at the key, we identified that this sample belongs to Epoch5, which has a common key for encryption in all the samples. Let us now look at the encryption process and C2 Communication:<\/p>\n<ol>\n<li><strong>BCryptFinalizeKeyPair<\/strong>: Keypair of ECC is finalized<\/li>\n<li><strong>BCryptExportKey<\/strong>: Generated key is exported to the memory blob<\/li>\n<li><strong>BCryptSecretAgreement<\/strong>: AES key is generated based on the Secret agreement between malware and C2<\/li>\n<li><strong>BCryptDeriveKey<\/strong>: Derives a key from secret agreement value using SHA256 as KDF<\/li>\n<li><strong>BCryptGetProperty<\/strong>: Retrieves a property for a CNG object<\/li>\n<li><strong>BCryptImportKey<\/strong>: To import the key from the memory blob<\/li>\n<li><strong>BCryptCloseAlgorithmProvider<\/strong>: Closes the handle of the Algorithm provider<\/li>\n<li><strong>BCryptDestroySecret<\/strong>: Secret is destroyed generated from BCryptSecretAgreement<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-91100\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/10\/28.png\" alt=\"\" width=\"1141\" height=\"511\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/28.png 1141w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/28-300x134.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/28-650x291.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/28-768x344.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/28-789x353.png 789w\" sizes=\"(max-width: 1141px) 100vw, 1141px\" \/><\/li>\n<\/ol>\n<p><strong><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Fig:<\/em><\/strong><strong><em> 13 ECDH Public key<\/em><\/strong><\/p>\n<h3><strong>Summarizing the steps: <\/strong><\/h3>\n<ol>\n<li>EDCH(ECK1 Curve) public key is decrypted and used for encryption of data sent, and ECDSA(ECS1 curve) is used for data verification<\/li>\n<li>A secret agreement is generated between malware and C2. This agreement value is created from the Public and private key of ECDH<\/li>\n<li>AES key is derived from a secret agreement value by using SHA 256 as KDF<\/li>\n<li>Now the message to be sent is constructed, and a hash value is generated.<\/li>\n<li>The hash value, along with the message, is then encrypted by AES256<\/li>\n<li>The data consisting of ECK1 public key, AES data, and random bytes are then base64 encoded and sent.<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-91101\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/10\/29.png\" alt=\"\" width=\"1142\" height=\"495\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/29.png 1142w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/29-300x130.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/29-650x282.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/29-768x333.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2022\/10\/29-789x342.png 789w\" sizes=\"(max-width: 1142px) 100vw, 1142px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Fig:<\/em><\/strong><strong><em> 14<\/em><\/strong><\/p>\n<h3><strong>\u00a0<\/strong><strong>Decrypted C2 List:<\/strong><\/h3>\n<p>103[.]8[.]26[.]17<\/p>\n<p>134[.]122[.]119[.]23<\/p>\n<p>103[.]133[.]214[.]242<\/p>\n<p>93[.]104[.]209[.]107<\/p>\n<p>37[.]44[.]244[.]177<\/p>\n<p>196[.]44[.]98[.]190<\/p>\n<p>116[.]124[.]128[.]206<\/p>\n<p>88[.]217[.]172[.]165<\/p>\n<p>62[.]171[.]178[.]147<\/p>\n<p>185[.]148[.]168[.]220<\/p>\n<p>103[.]85[.]95[.]4<\/p>\n<p>195[.]77[.]239[.]39<\/p>\n<p>159[.]69[.]237[.]188<\/p>\n<p>190[.]90[.]233[.]66<\/p>\n<p>85[.]214[.]67[.]203<\/p>\n<p>217[.]182[.]143[.]207<\/p>\n<p>203[.]153[.]216[.]46<\/p>\n<p>103[.]42[.]58[.]120<\/p>\n<p>59[.]148[.]253[.]194<\/p>\n<p>68[.]183[.]91[.]111<\/p>\n<p>110[.]235[.]83[.]107<\/p>\n<p>54[.]38[.]242[.]185<\/p>\n<p>85[.]25[.]120[.]45<\/p>\n<p>37[.]59[.]209[.]141<\/p>\n<p>54[.]37[.]106[.]167<\/p>\n<p>103[.]41[.]204[.]169<\/p>\n<p>66[.]42[.]57[.]149<\/p>\n<p>175[.]126[.]176[.]79<\/p>\n<p>54[.]37[.]228[.]122<\/p>\n<p>87[.]106[.]97[.]83<\/p>\n<p>45[.]71[.]195[.]104<\/p>\n<p>195[.]154[.]146[.]35<\/p>\n<p>139[.]196[.]72[.]155<\/p>\n<p>36[.]67[.]23[.]59<\/p>\n<p>5[.]56[.]132[.]177<\/p>\n<p>202[.]134[.]4[.]210<\/p>\n<p>78[.]46[.]73[.]125<\/p>\n<p>202[.]29[.]239[.]162<\/p>\n<p>210[.]57[.]209[.]142<\/p>\n<p>118[.]98[.]72[.]86<\/p>\n<p>207[.]148[.]81[.]119<\/p>\n<p>68[.]183[.]93[.]250<\/p>\n<p>103[.]56[.]149[.]105<\/p>\n<p>178[.]62[.]112[.]199<\/p>\n<p>54[.]38[.]143[.]246<\/p>\n<p>51[.]68[.]141[.]164<\/p>\n<p>104[.]248[.]225[.]227<\/p>\n<p>78[.]47[.]204[.]80<\/p>\n<p>202[.]28[.]34[.]99<\/p>\n<p>188[.]225[.]32[.]231<\/p>\n<p>194[.]9[.]172[.]107<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>IOC<\/strong><\/h3>\n<p>da045fce83afdcb9920a0a38b279d33d<\/p>\n<h3><strong>Detections<\/strong><\/h3>\n<p>Trojan.Emotet.S28135758<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Conclusion:<\/strong><\/h3>\n<p>Emotet has now evolved and has become more potent after its comeback. Among other things, it has switched from 32 bit to 64 bit, used CFF along with API hashing, and changed its <a href=\"https:\/\/www.quickheal.co.in\/home-users\/quick-heal-antivirus-pro\">encryption mechanism<\/a> from RSA to ECC. It has also used Crypt APIs from bcrypt.dll, whereas earlier, it was using ADVAPI.DLL. It is one of the top malware that path to further additional malware.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Emotet is usually delivered by SPAM campaigns containing document files. This self-propagating Trojan is a downloader malware that typically downloads and executes additional payloads. Around Jan 2021, Emotet\u2019s operations were reportedly shut down. However, it has shown its appearance again by the end of 2021. In recent months, Emotet seems to have shifted to 64 [&hellip;]<\/p>\n","protected":false},"author":85,"featured_media":91104,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1739,1671,24,75,1],"tags":[534,1615,1918,49,80,50],"class_list":["post-91068","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-encryption","category-malware","category-microsoft-windows","category-uncategorized","tag-cybersecurity","tag-emotet","tag-infosec","tag-malware","tag-quick-heal","tag-ransomware"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/91068"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/85"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=91068"}],"version-history":[{"count":15,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/91068\/revisions"}],"predecessor-version":[{"id":91755,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/91068\/revisions\/91755"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/91104"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=91068"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=91068"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=91068"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}