Welcome to our

Cyber Security News Aggregator

.

Cyber Tzar

provide a

cyber security risk management

platform; including automated penetration tests and risk assesments culminating in a "cyber risk score" out of 1,000, just like a credit score.

EmoCheck - Emotet Detection Tool For Windows OS

published on 2022-06-27 12:30:00 UTC by Unknown
Content:


Emotet detection tool for Windows OS.

How to use

  1. Download EmoCheck from the Releases page.
  2. Run EmoCheck on the host.
  3. Check the exported report.

Download

Please download from the Releases page.

Command options

(since v0.0.2)

  • Specify output directory for the report (default: current directory)
    • /output [your output directory] or -output [your output directory]
  • No console output
    • /quiet or -quiet
  • Export the report in JSON style
    • /json or -json
  • Debug mode (no report)
    • /debug or -debug
  • Show help
    • /help or -help

How EmoCheck detects Emotet

(v0.0.1)
Emotet generates their process name from a specific word dictionary and C drive serial number. EmoCheck scans the running process on the host, and find Emotet process from their process name.

(added in v0.0.2)
Emotet keeps their encoded process name in a specific registry key. EmoCheck looks up and decode the registry value, and find it from the process list. Code Signing with Microsoft Authenticode.

(added in v1.0)
Support the April 2020 updated of Emotet.
Obfuscated code.

(added in v2.0)
Support the December 2020 updated of Emotet.
French language support. (Thanks to CERT-FR)

Sample Report

Text stlye:

[Emocheck v0.0.2]
Scan time: 2020-02-10 13:06:20
____________________________________________________

[Result]
Detected Emotet process.

[Emotet Process]
Process Name : mstask.exe
Process ID : 716
Image Path : C:\Users\[username]\AppData\Local\mstask.exe
____________________________________________________

Please remove or isolate the suspicious execution file.

JSON style (added in v0.0.2):

{
"scan_time":"2020-02-10 13:06:20",
"hostname":"[your hostname]",
"emocheck_version":"0.0.2",
"is_infected":"yes",
"emotet_processes":[
{
"process_name":"mstask.exe",
"process_id":"716",
"image_path":"C:\\Users\\[username]\\AppData\\Local\\mstask.exe"
}
]
}

The report will be exported to the following path.

(v0.0.1)
[current directory]\yyyymmddhhmmss_emocheck.txt

(since v0.0.2)
[output path]\[computer name]_yyyymmddhhmmss_emocheck.txt
[output path]\[computer name]_yyyymmddhhmmss_emocheck.json

Screenshot

(v0.0.1)

Releases

  • (Feb. 3, 2020) v0.0.1
    • Initial release
  • (Feb. 10, 2020) v0.0.2
    • update detecting method
    • add options
  • (Aug. 11, 2020) v1.0.0
    • update detecting method
  • (Jan. 27, 2021) v2.0.0
    • update detecting method
    • Added French language support
  • (Mar. 4, 2022) v2.1.0
    • update detecting method
  • (Mar. 14, 2022) v2.1.1
    • Fixed a crash bug when executing with SYSTEM privileges
  • (Apr. 22, 2022) v2.2.0
    • update detecting method
  • (May. 20, 2022) v2.3.0
    • update detecting method
  • (May. 24, 2022) v2.3.1
    • fixed a detection pattern
  • (May. 27, 2022) v2.3.2
    • fixed a detection pattern

License

Please read the LICENSE page.

Notes

Tested environments

  • Windows 11 21H2 64bit Japanese Edition
  • Windows 10 21H2 64bit Japanese Edition
  • Windows 8.1 64bit Japanese Edition
  • Windows 7 SP1 32bit Japanese Edition
  • Windows 7 SP1 64bit Japanese Edition

Windows 7 does not support UTF-8 output in the Command Prompt.

Build

  • Windows 10 1809 64bit Japanese Edition
  • Microsoft Visual Studio Community 2017

Source code

Not published from v2.1.



Article: EmoCheck - Emotet Detection Tool For Windows OS - published over 2 years ago.

http://www.kitploit.com/2022/06/emocheck-emotet-detection-tool-for.html   
Published: 2022 06 27 12:30:00
Received: 2022 08 08 21:50:41
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Views: 1

Custom HTML Block

Click to Open Code Editor