Home Applications Bromium Emotet Banking Trojan polymorphic malware analysis

Bromium Emotet Banking Trojan polymorphic malware analysis

Bromium Emotet Banking Trojan polymorphic malware analysis
  • We analyzed samples containing the Emotet banking trojan and broke down the findings in a side-by-side comparison.
  • Malware authors are repacking their malicious software into a unique executable for each potential victim, avoiding any-and-all signature-based detection.
  • Repacked dropped executables on this scale are unprecedented, and this is why application isolation and control is so important. Protect before you detect is the only secure approach.

Recently, the Bromium Lab team uncovered a series of samples containing the Emotet banking trojan, which indicates that malware authors are rapidly rewrapping their packed executables and the documents used to distribute them. Based on feedback and further monitoring, we investigated the polymorphic dropped executables in more detail. The results are quite interesting; the samples don’t just feature trivial changes or the addition of random data. Rather, the sample appears like completely different software in many aspects. This allows the samples to avoid signature-based anti-virus as well as package detection and static analysis.

Extravagant repackaging hides the malware.

We have collected dozens of samples and analyzed several dropped from various malicious servers linked to this campaign. For ease of sharing, we will compare two samples side by side. Both were dropped from different malicious documents received in quick succession from the same malicious server.

As you can see, these samples are superficially very different. However, basic dynamic analysis using Procmon shows that, once unpacked, they execute the same sequence of system calls.

Watch application isolation in action: see Bromium contain malware.

To understand what’s happening, we disassemble and compare.

Shortly after the entry-point of each sample we reach the start of what could be considered a “dummy program.” This appears to be randomly generated code designed to look like a legitimate application. For example, Sample One calls CreateMetaFile [https://msdn.microsoft.com/en-us/library/windows/desktop/dd183506(v=vs.85).aspx] to make a file “ExwgBDryShtwACnd” that it doesn’t use. Sample Two calls EmptyClipboard [https://msdn.microsoft.com/en-us/library/windows/desktop/ms649037(v=vs.85).aspx] and neither appear to change the behavior of the program in any meaningful way. Since the two samples were received in quick succession, we have reason to believe that this process may be automated.

Read the entire article here, Bromium Emotet Banking Trojan polymorphic malware analysis

via the fine folks at Bromium


Bromium was founded in 2010 with a mission to restore trust in computing. The company’s founders, Gaurav Banga, Simon Crosby, and Ian Pratt, have a long and deep history of innovation in virtualization and security. Inspired by the isolation principles of traditional virtualization, the Bromium team has created a game-changing new technology called micro-virtualization to address the enterprise security problem and provide protection for end users against advanced malware. Bromium has its headquarters in Cupertino, California, and an R&D center in Cambridge, UK. The company is backed by top-tier investors, including Andreessen Horowitz, Ignition Capital, Highland Capital Partners, Intel Capital, Meritech Capital and Lightspeed Venture Partners.

Tell us what you think... Leave a comment below:

Be the First to Comment!


Featured Resources:

Related Articles:


White Papers


      Latest Videos

        Views All IT News on DABCC.com
        Views All IT Videos on DABCC.com
        Register Today for Disrupt End User Computing Forum 2018

        Visit Our Sponsors