Deep Analysis of New Emotet Variant – Part 2

Credit to Author: Xiaopeng Zhang| Date: Tue, 09 May 2017 11:11:59 -0700
This is the second part of FortiGuard Labs’ deep analysis of the new Emotet variant. In the first part of the analysis we demonstrated that by bypassing the server-side Anti-Debug or Anti-Analysis technique we could download three or four modules (.dll files) from the C&C server. In that first blog we only analyzed one module (I named it ‘module2’). In this blog, we’ll review how the other modules work. Here we go.
Read More




