Source |
Fortinet |
Identifiant |
361552 |
Date de publication |
2017-05-03 10:50:33 (vue: 2017-05-03 10:50:33) |
Titre |
Deep Analysis of New Emotet Variant |
Texte |
Background
Last week, FortiGuard Labs captured a JS file that functions as a malware downloader to spread a new variant of the Emotet Trojan. Its original file name is Invoice__779__Apr___25___2017___lang___gb___GB779.js. A JS file, as you may be aware, is a JavaScript file that can be executed by a Window Script Host (wscript.exe) simply by double-clicking on it. In this blog we will analyze how this new malware works by walking through it step by step in chronological order.
A JS file used to spread malware
The original JS code... |
Notes |
|
Envoyé |
Oui |
Condensat |
2017 779 analysis analyze apr aware background blog can captured chronological clicking code deep double downloader emotet exe executed file fortiguard functions gb779 host how invoice its javascript labs lang last malware may name new order original script simply spread step through trojan used variant walking week will window works wscript |
Tags |
|
Stories |
|
Move |
|