| Name | Description |
|---|---|
| Geodo |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 | ||
| Enterprise | T1555 | .003 | 从密码存储中获取凭证: Credentials from Web Browsers |
Emotet has been observed dropping browser password grabber modules. [2][4] |
| Enterprise | T1036 | .004 | 伪装: Masquerade Task or Service |
Emotet has installed itself as a new service with the service name |
| Enterprise | T1543 | .003 | 创建或修改系统进程: Windows Service |
Emotet has been observed creating new services to maintain persistence.[6][7][5] |
| Enterprise | T1573 | 加密通道 |
Emotet has encrypted data before sending to the C2 server.[8] |
|
| .001 | Symmetric Cryptography |
Emotet is known to use RSA keys for encrypting C2 traffic. [2] |
||
| Enterprise | T1620 | 反射性代码加载 | ||
| Enterprise | T1140 | 反混淆/解码文件或信息 |
Emotet has used a self-extracting RAR file to deliver modules to victims. Emotet has also extracted embedded executables from files using hard-coded buffer offsets.[5] |
|
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
Emotet has been observed adding the downloaded payload to the |
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
Emotet has used Powershell to retrieve the malicious payload and download additional resources like Mimikatz. [9][2][10][11][3] |
| .003 | 命令与脚本解释器: Windows Command Shell | |||
| .005 | 命令与脚本解释器: Visual Basic |
Emotet has sent Microsoft Word documents with embedded macros that will invoke scripts to download additional payloads. [9][12][2][10][3] |
||
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols | |
| Enterprise | T1003 | .001 | 操作系统凭证转储: LSASS Memory |
Emotet has been observed dropping and executing password grabber modules including Mimikatz.[2][13] |
| Enterprise | T1132 | .001 | 数据编码: Standard Encoding |
Emotet has used Google’s Protobufs to serialize data sent to and from the C2 server.[5] Additionally, Emotet has used Base64 to encode data before sending to the C2 server.[8] |
| Enterprise | T1110 | .001 | 暴力破解: Password Guessing |
Emotet has been observed using a hard coded list of passwords to brute force user accounts. [14][9][6][7][15][5] |
| Enterprise | T1078 | .003 | 有效账户: Local Accounts |
Emotet can brute force a local admin password, then use it to facilitate lateral movement.[14] |
| Enterprise | T1552 | .001 | 未加密凭证: Credentials In Files |
Emotet has been observed leveraging a module that retrieves passwords stored on a system for the current logged-on user. [6][15] |
| Enterprise | T1106 | 本机API |
Emotet has used |
|
| Enterprise | T1570 | 横向工具传输 |
Emotet has copied itself to remote systems using the |
|
| Enterprise | T1027 | .001 | 混淆文件或信息: Binary Padding |
Emotet inflates malicious files and malware as an evasion technique.[16] |
| .002 | 混淆文件或信息: Software Packing | |||
| .009 | 混淆文件或信息: Embedded Payloads |
Emotet has dropped an embedded executable at |
||
| .010 | 混淆文件或信息: Command Obfuscation |
Emotet has obfuscated macros within malicious documents to hide the URLs hosting the malware, CMD.exe arguments, and PowerShell scripts. [12][2][10][17] |
||
| .013 | 混淆文件或信息: Encrypted/Encoded File | |||
| Enterprise | T1204 | .001 | 用户执行: Malicious Link |
Emotet has relied upon users clicking on a malicious link delivered through spearphishing.[1][3] |
| .002 | 用户执行: Malicious File |
Emotet has relied upon users clicking on a malicious attachment delivered through spearphishing.[1][3][4] |
||
| Enterprise | T1114 | 电子邮件收集 |
Emotet has been observed leveraging a module that can scrape email addresses from Outlook.[15][4][5] |
|
| .001 | Local Email Collection |
Emotet has been observed leveraging a module that scrapes email data from Outlook.[15] |
||
| Enterprise | T1218 | .010 | 系统二进制代理执行: Regsvr32 | |
| Enterprise | T1033 | 系统所有者/用户发现 |
Emotet has enumerated all users connected to network shares. |
|
| Enterprise | T1016 | .002 | 系统网络配置发现: Wi-Fi Discovery |
Emotet can extract names of all locally reachable Wi-Fi networks and then perform a brute-force attack to spread to new networks.[5] |
| Enterprise | T1135 | 网络共享发现 |
Emotet has enumerated non-hidden network shares using |
|
| Enterprise | T1040 | 网络嗅探 |
Emotet has been observed to hook network APIs to monitor network traffic. [1] |
|
| Enterprise | T1134 | .001 | 访问令牌操控: Token Impersonation/Theft |
Emotet has the ability to duplicate the user’s token.[5] For example, Emotet may use a variant of Google’s ProtoBuf to send messages that specify how code will be executed.[13] |
| Enterprise | T1087 | .003 | 账号发现: Email Account |
Emotet has been observed leveraging a module that can scrape email addresses from Outlook.[15][4][5] |
| Enterprise | T1057 | 进程发现 | ||
| Enterprise | T1055 | .001 | 进程注入: Dynamic-link Library Injection |
Emotet has been observed injecting in to Explorer.exe and other processes. [10][1][6] |
| .012 | 进程注入: Process Hollowing |
Emotet uses a copy of |
||
| Enterprise | T1021 | .002 | 远程服务: SMB/Windows Admin Shares |
Emotet has leveraged the Admin$, C$, and IPC$ shares for lateral movement. [14][5] |
| Enterprise | T1210 | 远程服务漏洞利用 |
Emotet has been seen exploiting SMB via a vulnerability exploit like EternalBlue (MS17-010) to achieve lateral movement and propagation.[9][6][7][11] |
|
| Enterprise | T1041 | 通过C2信道渗出 | ||
| Enterprise | T1566 | .001 | 钓鱼: Spearphishing Attachment |
Emotet has been delivered by phishing emails containing attachments. [19][14][9][6][12][2][10][3][4] |
| .002 | 钓鱼: Spearphishing Link |
Emotet has been delivered by phishing emails containing links. [1][20][19][14][9][6][12][12][10] |
||
| Enterprise | T1571 | 非标准端口 |
Emotet has used HTTP over ports such as 20, 22, 443, 7080, and 50000, in addition to using ports commonly associated with HTTP/S.[12][5] |
|
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
Emotet has maintained persistence through a scheduled task, e.g. though a .dll file in the Registry.[6][13] |
| ID | Name | References |
|---|---|---|
| G0102 | Wizard Spider |