Emotet campaign surge during Black Friday and Cyber Monday 2018
Emotet campaign surge during Black Friday and Cyber Monday 2018

Black Friday Tool Deals 2018 Ad Scan XML: Emotet’s Holiday Season Malware Campaign

As Black Friday and Cyber Monday approached in 2018, online shoppers weren’t the only ones gearing up for a busy season. Cybercriminals, particularly the operators behind the Emotet malware, were also preparing to capitalize on the increased online activity. ESET researchers detected a significant surge in Emotet spam campaigns coinciding with the Black Friday shopping rush, revealing a shift in tactics and a clear focus on exploiting holiday season vulnerabilities.

Emotet, known for its widespread and impactful spam operations, launched a massive campaign taking advantage of the heightened email traffic surrounding Black Friday. The malware, typically spread through malicious attachments or links in spam emails, adopted a new technique. Instead of the usual DOC or PDF files, this campaign utilized XML files disguised with a misleading .doc extension. This subtle change likely aimed to bypass some security filters and trick users into opening the infected files.

These seemingly innocuous XML.doc attachments were the gateway to a range of harmful payloads. Emotet served as a delivery mechanism for various banking trojans, including Ursnif, TrickBot, and IcedId, with IcedId being the most prevalent. IcedId, in turn, often downloaded Azorult (detected by ESET as Win32/PSW.Delf.OSF), a notorious information stealer capable of pilfering passwords, credit card details, and cryptocurrency wallet access. TrickBot also expanded its reach, adding more UK and German banks to its target list, aligning with the English and German language themes observed in the spam email subjects and content, as previously highlighted by ESET.

The geographical distribution of this Black Friday Emotet campaign revealed a strong concentration in Latin America. Mexico, Ecuador, and Argentina topped the list of affected countries, experiencing hundreds of thousands of detections. The United States also ranked among the top five targeted nations, with the UK and South Africa also featuring in the top ten, indicating a broad and global impact of this holiday-themed cyber threat.

To help security professionals and system administrators identify and mitigate these threats, ESET researchers provided a list of Indicators of Compromise (IoCs) associated with the Emotet payloads used in this Black Friday campaign:

Indicators of Compromise (IoCs)

Emotet payloads

SHA-1 Hash Malware Family
02b614654f27b67aa3efcf94dcad3875696315ab TrickBot
cda88d48c26afd383a996fe2c0ef87514389c189 IcedId
0977692f1accd541dd7c23eb76f5272d4321d868 IcedId
3b000e5e6de4d91443563792d69caac95b1038f0 TrickBot
086bc2718521e6e4aead498b57d20d3b2ec812e9 Ursnif
202604e7dc6c29ae75ad9f707ebbc8bf5367a631 TrickBot
844e6a4c31ae473702781603d8cdd5f9b3aa63c5 IcedId
6481172f509f80ee059b7dc20a2bf995b38aafd2 TrickBot
9e8972dd0130481e1e42504c7fdda1ffa353e473 IcedId
db82d173e5afe207eeebacb65bd76cdbb67b5955 TrickBot
350e6b2f5728a17578923ab5a7640e0b57101447 IcedId
638d2c5b3331cdc2267d1036a9ff8e2efd08b316 IcedId
3c3624bfd75285c0d69f4867cc2adc5fb538888f IcedId
f75e600d29189065208d116602a2a6fccebf1927 IcedId
e38d371e17eeb34b6f94d05a208d0eb8a3b88f37 IcedId
765c272f914e85332d6e6a16e62645764f417379 TrickBot
ea24d6f25077f8a82c5a09e0b22040293b8a50d6 IcedId
d5d1c5c1af7c4e0346367cc1fdef0e788f25f1a6 IcedId

PSW.Delf.OSF – AZORult

SHA-1 Hash Malware Detection
3e435f2d58616e28972ad2c422f54e27680fb452 Win32/GenKryptik.CRSJ trojan
f17a455dc012027486ad39c134984cadbe7e31ef Win32/Kryptik.GMUX trojan
00169e624343cfda397d7a6df77b3e776b54e5ec Win32/Kryptik.GNEF

Staying informed about the latest cyber threats is crucial, especially during peak online shopping seasons. Subscribing to newsletters and security updates from reputable sources like ESET can provide valuable insights and proactive protection against evolving malware campaigns.

Related Articles

[ESET Research

DeceptiveDevelopment targets freelance developers

ESET Research

DeceptiveDevelopment targets freelance developers](/en/eset-research/deceptivedevelopment-targets-freelance-developers/ “DeceptiveDevelopment targets freelance developers”)

[ESET Research

PlushDaemon compromises supply chain of Korean VPN service

ESET Research

PlushDaemon compromises supply chain of Korean VPN service](/en/eset-research/plushdaemon-compromises-supply-chain-korean-vpn-service/ “PlushDaemon compromises supply chain of Korean VPN service”)

[ESET Research

Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344

ESET Research

Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344](/en/eset-research/under-cloak-uefi-secure-boot-introducing-cve-2024-7344/ “Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344”)

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply

Your email address will not be published. Required fields are marked *