Emotet now uses a non-traditional IP address format to evade detection

The Emotet Malware

For the first time in its history, the Emotet botnet has been spotted to use sophisticated social engineering tactics involving the deployment of malware by employing “unconventional” IP address formats. According to researchers, this is a crafty attempt to avoid detection by security solutions.

Emotet Malware 1024x531

The development comes in the aftermath of a resurgence in Emotet activity late last year, following a 10-month break that came as a result of a coordinated law enforcement effort.

According to a threat analysis report published by Trend Micro on Friday, this involves the use of hexadecimal and octal representations of the IP address, which, when processed by the underlying operating systems, are automatically converted to a dotted-decimal quad representation that initiates the request from the remote servers.

Like earlier Emotet-related attacks, the infection chains are designed to fool users into enabling document macros, which then automates the execution of malicious code. A feature of Excel 4.0 Macros, which has been regularly misused by unscrupulous actors in order to distribute malware, is employed in this document.

If the macro is enabled, it will call a URL that has been obfuscated with carets, with the host including the IP address in hexadecimal format, in order to run HTML application (HTA) code from a remote host.

It is possible to carry out the attack in an identical way, but instead of a hexademically represented IP address, the crooks include an IP address coded in an octal format.

Researchers believe that current solutions that rely on pattern matching may be circumvented as a result of the unusual use of hexadecimal and octal IP addresses. Pattern-based detection systems are always evolving, and evasion strategies such as these could be just another piece of evidence that attackers are continuing to innovate in order to bypass them.

According to information from November last year, researchers have discovered evidence that the Emotet malware has been adapting its tactics to dump TrickBot malware directly onto affected systems.

The revelation about the latest unconventional deploy tactics came at the same time as Microsoft announced its intentions to disable Excel 4.0 (XLM) Macros by default in order to protect users from security concerns.


About the author

Lidia Howler

Lidia is a web content creator with years of experience in the cyber-security sector. She helps readers with articles on malware removal and online security. Her strive for simplicity and well-researched information provides users with easy-to-follow It-related tips and step-by-step tutorials.

Leave a Comment

SSL Certificate

Web Safety Checker

About Us

HowToRemove.Guide is your daily source for online security news and tutorials. We also provide comprehensive and easy-to-follow malware removal guides. Watch our videos on interesting IT related topics.

Contact Us: info@howtoremove.guide

HowToRemove.Guide © 2024. All Rights Reserved.

Exit mobile version