🗃️ Emotet
Emotet Being Distributed Using Various Files
🔗 https://asec.ahnlab.com/en/34556/
Emotet DLL Part 2: Dynamic Analysis
🔗 https://www.atomicmatryoshka.com/post/emotet-dll-part-2-dynamic-analysis
Emotet Moves to 64 bit and Updates its Loader
🔗 https://blogs.vmware.com/security/2022/05/emotet-moves-to-64-bit-and-updates-its-loader.html
Emotet x64 Stack Strings Config Emulation
🔗 https://research.openanalysis.net/emotet/emulation/config/dumpulator/malware/2022/05/19/emotet_x64_emulation.html
Since its return in November 2021, Emotet has once again become one of the most prolific malware families.
🔗 https://unit42.paloaltonetworks.com/emotet-malware-summary-epoch-4-5/
The Resurgence of the Emotet Botnet Malware
🔗 https://www.trendmicro.com/en_us/research/22/e/bruised-but-not-broken--the-resurgence-of-the-emotet-botnet-malw.html
#microsoft #malware #feodo #cyber #emotet #mealybug #mummyspider #ta542 #botnet #emulation #geodo #threats #x64 #windows #loader #informatique