Emotet Loader Execution Via .LNK File

Detects the Emotet Epoch4 loader as reported by @malware_traffic back in 2022. The ".lnk" file was delivered via phishing campaign.

Sigma rule (View on GitHub)

 1title: Emotet Loader Execution Via .LNK File
 2id: 1f32d820-1d5c-43fe-8fe2-feef0c952eb7
 3status: experimental
 4description: |
 5    Detects the Emotet Epoch4 loader as reported by @malware_traffic back in 2022.
 6    The ".lnk" file was delivered via phishing campaign.    
 7references:
 8    - https://web.archive.org/web/20220422215221/https://twitter.com/malware_traffic/status/1517622327000846338
 9    - https://twitter.com/Cryptolaemus1/status/1517634855940632576
10    - https://tria.ge/220422-1pw1pscfdl/
11    - https://tria.ge/220422-1nnmyagdf2/
12author: '@kostastsale'
13date: 2022-04-22
14modified: 2024-08-15
15tags:
16    - attack.execution
17    - attack.t1059.006
18    - detection.emerging-threats
19logsource:
20    category: process_creation
21    product: windows
22detection:
23    selection:
24        ParentImage|endswith:
25            - '\cmd.exe'
26            - '\explorer.exe'
27            - '\powershell.exe'
28        Image|endswith:
29            - '\cmd.exe'
30            - '\powershell.exe'
31        CommandLine|contains|all:
32            - 'findstr'
33            - '.vbs'
34            - '.lnk'
35    condition: selection
36falsepositives:
37    - Unlikely
38level: high

References

Related rules

to-top