Emotet Now Using Unconventional IP Address Formats to Evade Detection

3 months ago 77


Social engineering campaigns involving the deployment of the Emotet malware botnet person been observed utilizing "unconventional" IP code formats for the archetypal clip successful a bid to sidestep detection by information solutions.

This involves the usage of hexadecimal and octal representations of the IP code that, erstwhile processed by the underlying operating systems, get automatically converted "to the dotted decimal quad practice to initiate the petition from the distant servers," Trend Micro's Threat Analyst, Ian Kenefick, said successful a study Friday.

Automatic GitHub Backups

The corruption chains, arsenic with erstwhile Emotet-related attacks, purpose to instrumentality users into enabling papers macros and automate malware execution. The papers uses Excel 4.0 Macros, a diagnostic that has been repeatedly abused by malicious actors to present malware.

Once enabled, the macro invokes a URL that's obfuscated with carets, with the big incorporating a hexadecimal practice of the IP code — "h^tt^p^:/^/0xc12a24f5/cc.html" — to execute an HTML exertion (HTA) codification from the distant host.


A 2nd variant of the phishing onslaught follows the aforesaid modus operandi, the lone quality being that the IP code is present coded successful the octal format — "h^tt^p^:/^/0056.0151.0121.0114/c.html".

"The unconventional usage of hexadecimal and octal IP addresses whitethorn effect successful evading existent solutions reliant connected signifier matching," Kenefick said. "Evasion techniques similar these could beryllium considered grounds of attackers continuing to innovate to thwart pattern-based detection solutions."

Prevent Data Breaches

The improvement comes amid renewed Emotet activity precocious past twelvemonth pursuing a 10-month-long hiatus successful the aftermath of a coordinated law enforcement operation. In December 2021, researchers uncovered grounds of the malware evolving its tactics to drop Cobalt Strike Beacons straight onto compromised systems.

The findings besides get arsenic Microsoft revealed plans to disable Excel 4.0 (XLM) Macros by default to safeguard customers against information threats. "This mounting present defaults to Excel 4.0 (XLM) macros being disabled successful Excel (Build 16.0.14427.10000)," the institution announced past week.

Found this nonfiction interesting? Follow THN connected Facebook, Twitter and LinkedIn to work much exclusive contented we post.

Read Entire Article