TrojanSpy.Win32.EMOTET.YXCBDZ
Trojan.Win32.Crypt(IKARUS), Win32/Emotet.CQ trojan(NOD32)
Windows

Threat Type: Trojan Spy
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
TECHNICAL DETAILS
Arrival Details
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Installation
This Trojan Spy drops a copy of itself in the following folders using different file names:
- %System%\{Random Characters}\{Random Characters}.{Random Characters}
(Note: %System% is the Windows system folder, where it usually is C:\Windows\System32 on all Windows operating system versions.)
It adds the following processes:
- %System%\rundll32.exe "%System%\{Random Characters}\{Random Characters}.{Random Characters}",{Random Characters}
- %System%\rundll32.exe "%System%\{Random Characters}\{Random Characters}.{Random Characters}",DllRegisterServer
(Note: %System% is the Windows system folder, where it usually is C:\Windows\System32 on all Windows operating system versions.)
Other Details
This Trojan Spy connects to the following possibly malicious URL:
- http://{BLOCKED}.{BLOCKED}.201.2
- http://{BLOCKED}.{BLOCKED}.201.4
- http://{BLOCKED}.{BLOCKED}.214.46
- http://{BLOCKED}.{BLOCKED}.225.142
- http://{BLOCKED}.{BLOCKED}.117.186
- http://{BLOCKED}.{BLOCKED}.255.201
- http://{BLOCKED}.{BLOCKED}.188.93
- http://{BLOCKED}.{BLOCKED}.24.231
- http://{BLOCKED}.{BLOCKED}.72.26
- http://{BLOCKED}.{BLOCKED}.186.49
- http://{BLOCKED}.{BLOCKED}.186.55
- http://{BLOCKED}.{BLOCKED}.222.101
- http://{BLOCKED}.{BLOCKED}.59.82
- http://{BLOCKED}.{BLOCKED}.230.105
- http://{BLOCKED}.{BLOCKED}.102.168
- http://{BLOCKED}.{BLOCKED}.50.39
- http://{BLOCKED}.{BLOCKED}.175.63
- http://{BLOCKED}.{BLOCKED}.99.3
- http://{BLOCKED}.{BLOCKED}.193.249
- http://{BLOCKED}.{BLOCKED}.106.96
- http://{BLOCKED}.{BLOCKED}.83.165
- http://{BLOCKED}.{BLOCKED}.147.66
- http://{BLOCKED}.{BLOCKED}.82.211
- http://{BLOCKED}.{BLOCKED}.71.210
- http://{BLOCKED}.{BLOCKED}.56.148
- http://{BLOCKED}.{BLOCKED}.133.20
- http://{BLOCKED}.{BLOCKED}.134.35
- http://{BLOCKED}.{BLOCKED}.109.124
- http://{BLOCKED}.{BLOCKED}.84.195
- http://{BLOCKED}.{BLOCKED}.17.99
- http://{BLOCKED}.{BLOCKED}.5.209
- http://{BLOCKED}.{BLOCKED}.56.116
- http://{BLOCKED}.{BLOCKED}.98.99
- http://{BLOCKED}.{BLOCKED}.226.206
- http://{BLOCKED}.{BLOCKED}.143.207
- http://{BLOCKED}.{BLOCKED}.204.126
- http://{BLOCKED}.{BLOCKED}.108.46
- http://{BLOCKED}.{BLOCKED}.115.99
- http://{BLOCKED}.{BLOCKED}.135.203
- http://{BLOCKED}.{BLOCKED}.114.231
- http://{BLOCKED}.{BLOCKED}.232.124
- http://{BLOCKED}.{BLOCKED}.222.11
- http://{BLOCKED}.{BLOCKED}.54.215
- http://{BLOCKED}.{BLOCKED}.140.238
- http://{BLOCKED}.{BLOCKED}.42.236
- http://{BLOCKED}.{BLOCKED}.212.216
- http://{BLOCKED}.{BLOCKED}.236.90
- http://{BLOCKED}.{BLOCKED}.152.127