2018-01-09 - EMOTET MALSPAM INFECTION TRAFFIC WITH ZEUS PANDA BANKER

ASSOCIATED FILES:

  • 2018-01-09-Emotet-and-Zeus-Panda-Banker-traffic.pcap   (3,183,730 bytes)
  • 2018-01-08-Zeus-Panda-Banker-store.json.exe   (172,032 bytes)
  • 2018-01-09-Emotet-maldoc-sample-INCORRECT_INVOICE.doc   (143,872 bytes)
  • 2018-01-09-Emotet-sample-shedulecart.exe   (151,552 bytes)

NOTES:


Shown above:  Flowchart for today's Emotet infection.

 

WEB TRAFFIC BLOCK LIST

Indicators are not a block list.  If you feel the need to block web traffic, I suggest the following domain:

 

TRAFFIC


Shown above:  Infection traffic in Wireshark.

 

POST-INFECTION TRAFFIC:

 

MALWARE

DOWNLOADED WORD DOC:

EMOTET BINARY RETRIEVED BY THE WORD MACRO:

ZEUS PANDA BANKER (KINS) RETRIEVED BY EMOTET:

 

FINAL NOTES

Once again, here are the associated files:

ZIP files are password-protected with the standard password.  If you don't know it, look at the "about" page of this website.

Click here to return to the main page.