Malware Analysis 101 — Emotet MalDoc a behavioral approach

Malware Analysis 101 — Emotet MalDoc a behavioral approach






It’s been a while since the last time I wrote an article about security but I’m back this time with my new hobby in my beloved field of low level security, malware analysis. This article is a part of a miniseries of two articles that I will demonstrate how I (dirty) went from the malicious down-loader to the unpacked version, of an Emotet botnet sample that fell in my hands, by pure luck.


Introduction


I really don’t think I should explain further on what Emotet is, with one phrase I could name it “A Banking Trojan/Bot on steroids that even Satan would lose his-her bank accounts from” to understand further on what Emotet is you can watch this amazing animated video bellow:

Emotet Explained Real Quick

So let’s head to the Write Up:


Sample Characteristics MD5 => 7ab1d4fac08b7210c03058626a4ad49dSHA-1 => e918b7e867769884cded21f22acbf03a996e51d2SHA-256 => af5d152ec16da71 ..

Support the originator by clicking the read the rest link below.