Results for emotet

Threat Research

FortiGuard Labs Weekly Threat Update – November 15, 2019

Learn about the cyber threats uncovered during the week of November 15, 2019.

By Jeannette Jarvis November 15, 2019

Threat Research

New Emotet Report Details Threats From One of the World’s Most Successful Malware Operations

FortiGuard Labs has released a new Adversary Playbook, which provides valuable information for detecting, understanding, and addressing recent iterations of Emotent. Learn more.

By FortiGuard SE TeamNovember 13, 2019

Threat Research

A Deep Dive into the Emotet Malware

FortiGuard Labs has been tracking Emotet since it was first discovered. This blog provides a deep analysis of a new Emotet sample found in early May.

By Kai LuJune 06, 2019

Threat Research

Analysis of the New Modules that Emotet Spreads

Just a few days ago, FortiGuard Labs published a research blog about a fresh variant of Emotet. When I wrote that blog, I had not yet detected any further malicious actions from its C&C server. However, I have continued to monitor its connections, and I finally received three new modules from its C&C server.

By Xiaopeng ZhangMarch 11, 2019

Threat Research

Deep Analysis of New Emotet Variant – Part 2

This is the second part of FortiGuard Labs’ deep analysis of the new Emotet variant. In the first part of the analysis we demonstrated that by bypassing the server-side Anti-Debug or Anti-Analysis technique we could download three or four modules (.dll files) from the C&C server. In that first blog we only analyzed one module (I named it ‘module2’). In this blog, we’ll review how the other modules work. Here we go.

By Xiaopeng ZhangMay 09, 2017

Threat Research

Deep Analysis of New Emotet Variant – Part 1

Background Last week, FortiGuard Labs captured a JS file that functions as a malware downloader to spread a new variant of the Emotet Trojan. Its original file name is Invoice__779__Apr___25___2017___lang___gb___GB779.js.  A JS file, as you may be aware, is a JavaScript file that can be executed by a Window Script Host (wscript.exe) simply by double-clicking on it. In this blog we will analyze how this new malware works by walking through it step by step in chronological order. A JS file used to spread malware The original JS code...

By Xiaopeng ZhangMay 03, 2017