Someone is poking fun at the Emotet botnet and heavily disrupting its operations by hacking into the malware's distribution sites and replacing malicious payloads with memes and GIFs.

This Emotehack operation has been happening for the past few days, providing some respite from Emotet spamming while the threat actor figures out how to regain control over their distribution sites.

LoLs for payloads

Emotet’s distribution relies on hacked websites where the actors store payloads to be used in their spam campaigns.

When victims of these campaigns fall for the ruse and open malicious spam attachments, executed macros will retrieve the Emotet malware payload from compromised sites in the botnet’s network.

Without a payload, the victim’s computer does not fall in Emotet’s grip. So whoever is replacing the malware in the botnet’s distribution network is doing a huge favor to users and also keeping the threat actor busy.

Joseph Roosen, a member of the Cryptolaemus group of researchers fighting Emotet, called the person messing with Emotet’s payloads a “white knight.”

The malicious documents and the malware from the botnet’s distribution sites were replaced with various images and memes.

Researchers saw images of James Franco at first and then Emotet’s hacked sites served the Hackerman meme.

 

“There is an ongoing battle for the control of the Emotet shells that drop maldocs/malware on T1 Distro sites. Someone is altering them to serve up Imgur gifs instead of malware,“ Roosen tweeted

The researcher told BleepingComputer that Emotet put spamming activity on standby because of the good samaritan’s actions, and will likely implement some changes to protect their operations.

When sending spam, Emotet will use a variety of different email templates and malicious document delivery.

Some emails will attach a malicious Word document directly to an email, while others include a link that a user must click on to download the document.

For those emails containing links, when a recipient clicks on it, instead of a malicious document being installed, they will see a meme or silly image instead.

This is illustrated in the video below.

Microsoft cybersecurity researcher Kevin Beaumont noticed these chucklesome modifications, saying that about a quarter of the payloads he checked had been replaced with GIFs.

The switch happened quite quickly, the payloads being replaced in less than an hour since Emotet planted them, the researcher said. After publishing this article, the researcher said that he noticed the vigilante moving even quicker in some cases, replacing the malware in under two minutes.

How does Emotehack happen

In short, bad opsec. Emotet operators use web shells to maintain access to the hacked websites in their distribution network. The most plausible explanation is that someone discovered the password and decided to use this advantage to disrupt Emotet operations.

Beaumont tweeted in late December 2019 that the actor relied on an open-source web shell and recycled the access password. One reason for this lack of effort could be that it works, thus unnecessary to be bothered with changing the password.

This rationale seems to hold these days, too. Roosen told us that Cryptolaemus researchers believe that someone has the password for the Emotet shell on the distribution sites and decided to programmatically replace the payloads.

However, Roosen points out that Emotet likely has other methods to drop the shells and could regain access to the vulnerable sites it uses for spreading malware.

If they control these machines, they could drop other web shells with a different password to regain control of their distribution network.

Emotet may buy access to servers from other threat actors that run traffic redirection scams. These lure users with advertisements and fake promotions to expose them to various scams and surveys.

At the time of writing, some of the sites where memes and images took the place of Emotet payloads are redirecting to surveys. One of the ruses we saw informed us that we had the chance to win a Samsung Galaxy S10 if we did a survey.

Related Articles:

Emotet malware campaign impersonates the IRS for 2022 tax season

Emotet growing slowly but steadily since November resurgence

Microsoft disrupts Zloader malware in global operation

New EnemyBot DDoS botnet recruits routers and IoTs into its army

US, UK link new Cyclops Blink malware to Russian state hackers