U.S. Internal Revenue Service Themed Phishing Campaign Delivers Emotet

Internal Revenue Service (IRS) is a federal tax administration and collection agency.
In early November, Threat actors sent a phishing email that appeared to be from United States IRS.
This phishing email was discovered by FortiGuard and had been sent by Emotet group using a compromised email account in Pakistan.
This Email consists of two attachments with the subject “IRS Tax Forms K-1” and requires a password to unpack.

The file copies itself into the “Templates” directory and later relaunches the file.
It consists of a malicious Excel 4.0 macro that executes within a workbook that isn’t protected and contains URL fragments that download additional payloads.
Emotet payload is downloaded via regsvr32.exe using the command “%WINDIR%System32regsvr32.exe /S ..oxnv[n].ooccxx”.
Emotet is a DLL file that utilizes anti-analysis/debugging method and has over 270 export functions.
After Emotet is running, It tries to contact C2 server nodes.

Sign Up For Threat Alerts

Loading...
Threats Icon

Apr 24, 2023

Lazarus Group Adds Linux Malware to Arsenal...

Researchers have discovered a new campaign conducted by Lazarus, known as "Operation DreamJob," which targets...

Threats Icon

Apr 23, 2023

Additional IOCs for 3cx breach

Recently an unexpected malicious activity emanating from a legitimate, signed binary, 3CXDesktopApp was observed.

Threats Icon

Apr 23, 2023

Ex-Conti and FIN7 Actors Collaborate with New...

IBM Security X-Force recently discovered a new malware family Analysts have called "Domino," which Analysts...

Threats Icon

Apr 20, 2023

AuKill EDR killer malware abuses Process Explorer...

The AuKill tool abuses an outdated version of the driver used by version 16.32 of...

Threats Icon

Apr 20, 2023

Fake Chrome updates spread malware

A campaign running since the end of last year is using hacked sites to push...

Threats Icon

Apr 20, 2023

QBot using new attack vector in its...

QBot, also known as QakBot, previously operated as a banking trojan and has since transformed...

Threats Icon

Apr 20, 2023

CrossLock Ransomware Emerges: New Golang – Based...

The CrossLock ransomware employs the double extortion technique to increase the likelihood of payment from...

Threats Icon

Apr 20, 2023

Windows Zero-Day Vulnerability CVE-2023-28252 Exploited by Nokoyawa...

A zero-day vulnerability in the Microsoft Windows system, which also affects Windows 11, has been...

Threats Icon

Apr 18, 2023

Additional IOcs for 3cx breach

Recently an unexpected malicious activity emanating from a legitimate, signed binary, 3CXDesktopApp was observed. As...

Threats Icon

Apr 18, 2023

Additional IOcs for 3cx breach

Recently an unexpected malicious activity emanating from a legitimate, signed binary, 3CXDesktopApp was observed. As...

Threats Icon

Apr 18, 2023

APT36 Expands Interest Within Indian Education Sector

Symantec described UPS in 2016 report as Buckeye (also known as APT3 Gothic Panda UPS...

Threats Icon

Apr 17, 2023

ChinaZ DDoS Bot Malware Distributed To Linux...

The ChinaZ DDoS bot malware was discovered targeting Linux systems while a version for Microsoft...

Threats Icon

Apr 16, 2023

Resurgence Of The Mexals Cryptojacking Campaign

The Mexals crypto jacking campaign has been in operation since at least 2021 and continues...

Threats Icon

Apr 13, 2023

Money Message Ransomware Targets Windows And Linux...

The Money Message ransomware targets both the Windows and Linux operating systems and exfiltrates sensitive...

Threats Icon

Apr 10, 2023

Mantis Uses New Tooling In Attacks Against...

The Mantis cyber-espionage group also known as Desert Falcon targeted entities within the Palestinian territories...