2017-12-27 - EMOTET INFECTION WITH ZEUS PANDA BANKER

NOTICE:

ASSOCIATED FILES:

  • 2017-12-27-Emotet-infection-with-Zeus-Panda-Banker.pcap   (2,505,252 bytes)
  • 2017-12-27-Emotet-malspam-1156-UTC.eml   (1,787 bytes)
  • 09:49 2017-12-27-Emotet-shedulecart.exe   (200,704 bytes)
  • 2017-12-27-Zeus-Panda-Banker-818200132aebmoouht.exe   (266,240 bytes)
  • Your Holidays Card.doc   (196,096 bytes)

NOTES:


Shown above:  Flowchart for today's traffic.

 

WEB TRAFFIC BLOCK LIST

Indicators are not a block list.  If you feel the need to block web traffic, I suggest the following domains and URLs:

 

EMAIL

HEADER INFORMATION:

 


Shown above:  Screenshot of the email.

 


Shown above:  Downloading a malicious Word document from link in the email.

 

TRAFFIC


Shown above:  Traffic from an infection filtered in Wireshark.

 

ASSOCIATED DOMAINS:

 

MALWARE

EMAIL ATTACHMENT (WORD DOCUMENT):

EMOTET BINARY:

ZEUS PANDA BANKER:

 

IMAGES


Shown above:  Some alerts from Sguil in Security Onion using Suricata and the EmergingThreats Pro (ETPRO) ruleset.

 


Shown above:  Some alerts on the infection traffic from the Snort subscriber ruleset when reading the pcap with Snort 2.9.11.

 


Shown above:  Malware persistent on the infected Windows host.

 

Click here to return to the main page.