Reawakening of Emotet: An Analysis of its JavaScript Downloader

Reawakening of Emotet: An Analysis of its JavaScript Downloader

In mid-September 2019, Emotet resumed its activity and we evaluated changes to its operation in a previous blog post by Alex Holland. One of the noticeable changes is that some of the ...
Deobfuscating Ostap: TrickBot’s 34,000 Line JavaScript Downloader

Deobfuscating Ostap: TrickBot’s 34,000 Line JavaScript Downloader

Introduction For a malicious actor to compromise a system, they need to avoid being detected at the point of entry into the target’s network. Commonly, phishing emails delivering malicious attachments (T1193) serve ...

Trojans: What’s the real deal?

We take a fresh look at Trojans: the history of the term, the most popular threats over the years, the different types of Trojans, and their relationship with social engineering. Categories: Cybercrime ...
Malware analysis: decoding Emotet, part 2

Malware analysis: decoding Emotet, part 2

In part two of our series on decoding Emotet, we analyze the PowerShell code flow and structure. We also reconstruct the command-line arguments—for fun! Categories: Malware Threat analysis Tags: code analysisdownloaderemotetencryptionpowershell (Read ...