Bromium Webinar: Emotet – Taming a Wild Trojan

Answering Your Emotet Questions from the Webinar, Emotet: Taming a Wild Trojan

| | Emotet, threats, Webinar
On June 12, we hosted a deep-dive technical webinar on Emotet, featuring Robert Bigman, former CISO at the CIA, and James Wright, VP Engineering and Threat Research at Bromium In this blog, ...

June 12 Webinar, Emotet: Taming a Wild Trojan

Join Bromium for a technical deep dive webinar on Wednesday, June 12 at 10am PDT/1pm EDT Learn about Emotet – a highly-modular banking Trojan, which has evolved into a polymorphic malware Featuring ...

Now Available: Bromium Threat Insights Report – June 2019 Edition

This month’s most notable threat is Emotet – a rapidly evolving polymorphic banking Trojan If you haven’t yet enabled your Threat Forwarding, we invite you to do so, and join a community ...
The Emotet-ion Game (Part 3)

The Emotet-ion Game (Part 3)

This blog is a continuation of our blog series on the Emotet banking Trojan. So far, we have analysed Emotet’s delivery mechanism and its behaviour through dynamic analysis. The host and network ...
We will walk through the script to find interesting patterns and deobfuscate the code.

Emotet: Catch Me If You Can (Part 2 of 3)

Emotet is a highly modular banking Trojan that has a proper decision tree-based algorithm to perform designated tasks. Due to Emotet’s capability to deliver obfuscated payloads and extend its capabilities through self-upgradable ...
Emotet, Lokibot, TrickBot still impacting enterprise environments globally

Emotet, Lokibot, TrickBot still impacting enterprise environments globally

New research based on observed attack data over the second half of 2018 (2H 2018) reveals the command-and-control and lateral activities of three high-profile pieces of malware targeting large organizations in recent ...
Bromium-Emotet-Order-Details

Emotet: How It Might Infect Your PC

The most prolific malware that Bromium has been seeing in customer environments over the last three months has been Emotet. Since this appears to be the preferred malware campaign of the moment, ...
Network Diagram

Video: TrickBot and ETERNALCHAMPION

This video tutorial is a walkthrough of how you can analyze the PCAP file UISGCON-traffic-analysis-task-pcap-2-of-2.pcap (created by Brad Duncan). The capture file contains a malicious Word Document (macro downloader), Emotet (banking trojan), ...
Flaw Allows Hacking Macs, iOS Devices with Single Network Packet

Flaw Allows Hacking Macs, iOS Devices with Single Network Packet

Apple has fixed a serious vulnerability in macOS and iOS that could allow hackers to compromise devices over the local network by sending them a single malformed Internet Protocol (IP) packet. The ...
Security Boulevard
Malware analysis: decoding Emotet, part 2

Malware analysis: decoding Emotet, part 2

In part two of our series on decoding Emotet, we analyze the PowerShell code flow and structure. We also reconstruct the command-line arguments—for fun! Categories: Malware Threat analysis Tags: code analysisdownloaderemotetencryptionpowershell (Read ...
Loading...