Malware, Threat Management, Vulnerability Management

Emotet changes tactics to curb detection

Unusual IP address formats have been observed in social engineering campaigns distributing the Emotet malware botnet in an effort to evade security system detection, reports The Hacker News. Attackers have been using hexadecimal and octal IP address representations that are automatically converted by operating systems "to the dotted decimal quad representation to initiate the request from the remote servers," wrote Trend Micro Threat Analyst Ian Kenefick in a report. Samples examined by researchers revealed that the attack chain begins with the commonly exploited Excel 4.0 Macros feature, which when enabled turns to a caret-obfuscated URL to facilitate remote host-based HTML application code execution, with the host having a hexadecimal IP address representation. The second attack variant was largely similar except that it leveraged an octal-coded IP address. "The unconventional use of hexadecimal and octal IP addresses may result in evading current solutions reliant on pattern matching... Evasion techniques like these could be considered evidence of attackers continuing to innovate to thwart pattern-based detection solutions," Kenefick added.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds