Rewterz Threat Advisory – CVE-2020-10189 – Zoho Critical Zero-Day Flaw Disclosed
March 7, 2020Rewterz Threat Advisory – Microsoft Patch Tuesday Fixes 115 Vulnerabilities
March 11, 2020Rewterz Threat Advisory – CVE-2020-10189 – Zoho Critical Zero-Day Flaw Disclosed
March 7, 2020Rewterz Threat Advisory – Microsoft Patch Tuesday Fixes 115 Vulnerabilities
March 11, 2020Severity
High
Analysis Summary
A core function of the new package is that instead of bundling the Emotet loader with the spreader, the loader is now downloaded from a server. Previously a stand-alone program, the new Wi-Fi spreader has become a full-fledged module in the Emotet package. While not affecting the functionality of the malware, the changes allow for step-by-step logging and debugging logs from the infected machines. Using a new communications protocol, two PHP POST arguments are sent to provide the aforementioned debugging output. The only notable change to Emotet’s spreader functionality is should the brute-force against the C$ share fail, the spreader attempts to brute-force the ADMIN$ share. As with previous versions of Emotet, services.exe is downloaded from a hard-coded server. This version of services.exe downloads the Emotet binary from the C2. If Emotet is downloaded successfully, services.exe sends “payload downloaded ok” to the C2 before execution.
Impact
Information theft
Indicators of Compromise
IP
- 69[.]43[.]168[.]245
SHA-256
- efbfc8500b4af8b39d940668c0dd39452c529ce8d3ead77da3057f1fc7499aef
- 8a4239737f41b7f1730e6b6fdd2ecc3f1a4862bb6ab17f8a3d5eeba59423a8a0
- 3c72f2fe57a0a6f1566bcc809b1039fafb483d5cb15efe8a03c3d68d5db2589f
Remediation
Block all threat indicators at your respective controls.