Opalsec :verified: · @Opalsec
172 followers · 80 posts · Server infosec.exchange

The prolific malware - tracked under the actor and - is back after a 3 month break, delivering inflated (~500MB) macro-enabled Word documents via invoice-themed Phishing emails.

bleepingcomputer.com/news/secu

The Word documents are contained in a password protected archive, and once opened and the malicious content is enabled, will download the Emotet payload - a similarly bloated dll file, designed to bypass automated scanning solutions that typically can't process large files.

Malware analyst Max Malyutin has a great summary of the ATT&CK techniques and IOCs seen in this campaign so far: twitter.com/Max_Mal_/status/16

Analysts may find debloat - a tool that strips guff from intentionally bloated executables - useful in processing samples: github.com/Squiblydoo/debloat

#emotet #mummyspider #ta542 #infosec #cyber #news #cybernews #infosecnews #informationsecurity #cybersecurity #security #technology #malware #soc #threatintel #threatintelligence #phishing

Last updated 1 year ago