{"id":18475,"date":"2021-01-28T01:02:59","date_gmt":"2021-01-28T00:02:59","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=18475"},"modified":"2021-01-29T01:52:23","modified_gmt":"2021-01-29T00:52:23","slug":"emotet-reportedly-uninstalls-itself-on-march-25-2021","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2021\/01\/28\/emotet-reportedly-uninstalls-itself-on-march-25-2021\/","title":{"rendered":"Emotet reportedly uninstalls itself on  April 25, 2021"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2021\/01\/28\/emotet-deinstalliert-sich-angeblich-am-25-mrz-2021\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Currently, it's reported, that the Emotet malware will automatically uninstall itself from infected systems on April 25, 2021 (1st I reported March) at 12:00 a.m CET. However, it is unclear to me who exactly is behind this action &#8211; the German BKA and the Dutch police are mentioned. Here is the information that has just been leaked via security researchers and Europol.<\/p>\n<p><!--more--><\/p>\n<h2>Emotet C&amp;C server seized<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg04.met.vgwort.de\/na\/4979a423481244d3bb05b5cacadd8be0\" alt=\"\" width=\"1\" height=\"1\" \/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg04.met.vgwort.de\/na\/e8ea3175f78043dcbe942b903c0d4cd4\" alt=\"\" width=\"1\" height=\"1\" \/>A few hours ago it became known that law enforcement agencies (BKA, Europol etc.) seized the infrastructure of the Emotet malware and took control of its servers. In Germany alone, 17 servers have been taken over. I had reported about this action in the blog post <a href=\"https:\/\/borncity.com\/win\/2021\/01\/27\/bka-infrastruktur-der-emotet-schadsoftware-bernommen-und-zerschlagen\/\">German BKA initiate a takedown of Emotet malware infrastructure<\/a>. There it was still said that the Emotet malware would be sent \"into quarantine\" on the victim systems. In addition, German Bundeskriminalamt (BKA) logs the IP addresses of the victim systems that contact the Emotet C&amp;C servers. Then, the providers are to be informed so that they can notify the customers about the infection.<\/p>\n<h2>Emotet uninstallation scheduled for April 25, 2021?<\/h2>\n<p>A Twitter user with the alias mikream noticed a few hours ago that all C&amp;C.servers that can still be contacted are distributing a new payload that is supposed to remove an Emotet infection via script on March 25, 2021 at 12:00. This can be seen from the following <a href=\"https:\/\/twitter.com\/milkr3am\/status\/1354459859912192002\" target=\"_blank\" rel=\"noopener\">tweets<\/a>, whereby eight C&amp;C servers, which according to the IP are located in Germany, are delivering this payload.<\/p>\n<p><a href=\"https:\/\/twitter.com\/milkr3am\/status\/1354459859912192002\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"Emotet-Update mit Time Bomb\" src=\"https:\/\/i.imgur.com\/p5GtVH7.png\" alt=\"Emotet-Update mit Time Bomb\" \/><\/a><\/p>\n<blockquote><p><strong>Addendum:<\/strong> The end date, that triggers the uninstall, may be April 25, 2021, because the month is counted in C from 0-11 \u2013 see also <a href=\"https:\/\/twitter.com\/MBThreatIntel\/status\/1354842730711502850\" target=\"_blank\" rel=\"noopener external noreferrer\" data-wpel-link=\"external\">this tweet<\/a>.<\/p><\/blockquote>\n<h2>Unclear who is behind the action<\/h2>\n<p>There is some discrepancy regarding information on who exactly is behind the action. Catalin Cimpanu <a href=\"https:\/\/www.zdnet.com\/article\/authorities-plan-to-mass-uninstall-emotet-from-infected-hosts-on-march-25-2021\/\" target=\"_blank\" rel=\"noopener\">writes on ZDNet.com<\/a> that Dutch police state that two out of three of the primary Emotet command-and-control (C&amp;C) servers are located in the Netherlands and have been seized. This source says that the Dutch police are using access to these two key servers to distribute a timebombed Emotet update to all infected hosts.<\/p>\n<p>What makes me suspicious, however, are the IP addresses given in the above tweet, which refer to the Open Telekom Cloud and German sites. Bleeping Computer, on the other hand, writes in <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/europol-emotet-malware-will-uninstall-itself-on-march-25th\/\" target=\"_blank\" rel=\"noopener\">this article<\/a>:<\/p>\n<blockquote><p>In a phone call with Europol's press office, BleepingComputer was told that the German Bundeskriminalamt (BKA) federal police agency was responsible for this action. The press office, though, did not know the date that law enforcement would uninstall the malware.<\/p><\/blockquote>\n<p>They cite a phone call with the press department of Europol, which claims German Bundeskriminalamt (BKA) federal police agency was responsible for this action. Bleeping Computer writes that it is unclear why law enforcement waited two months to uninstall the malware. However, two questions are on my mind:<\/p>\n<ul>\n<li>So far, my understanding has been that distributing the update that removes the Emotet malware from an infected system falls within the realm of computer sabotage (we have such a law in Germany) &#8211; because something is being changed on the system. In Germany, legal hurdles would have to be overcome.<\/li>\n<li>Furthermore, the <a href=\"https:\/\/www.virustotal.com\/gui\/file\/a9c68d527223db40014d067cf4fdae5be46cca67387e9cfdff118276085f23ef\/detection\" target=\"_blank\" rel=\"noopener\">link to VirusTotal<\/a> posted in the above tweet makes me wonder. There, the 404 KB update is actually detected as a Trojan by all virus scanners (see the following image).<\/li>\n<\/ul>\n<p><a href=\"https:\/\/i.imgur.com\/WLvDa0O.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" title=\"Emotet-Update auf VirusTotal\" src=\"https:\/\/i.imgur.com\/WLvDa0O.png\" alt=\"Emotet-Update auf VirusTotal\" width=\"600\" height=\"485\" \/><\/a><br \/>\nEmotet-Update auf VirusTotal, <a href=\"https:\/\/i.imgur.com\/WLvDa0O.png\" target=\"_blank\" rel=\"noopener\">Click to zoom<\/a><\/p>\n<p>If I now add up 1+1, we have the situation that the BKA may not actually be allowed to distribute the update with the time bomb (I am not sure about the legal assessment). At the same time, all systems with a reasonably up-to-date virus scanner should actually recognize this update as a Trojan and send it to quarantine. There are reports in several media that an update with Timebomb is being distributed to shut down Emotet. And ZDNet writes that two security companies monitoring Emotet activity have confirmed the process to distribute the update. But it's unclear to me at this point who exactly is behind the action and how successful the whole thing really is at the end of the day.<\/p>\n<p>Addendum: <a href=\"https:\/\/www.justice.gov\/opa\/pr\/emotet-botnet-disrupted-international-cyber-operation\" target=\"_blank\" rel=\"noopener\">Here is the statement<\/a> of US Department of Justice (DOJ).<\/p>\n<p><strong>Similar articles:<br \/>\n<\/strong><a href=\"https:\/\/borncity.com\/win\/2020\/08\/17\/emocrash-impfschutz-vor-emotet-infektionen\/\">EmoCrash protectet systems for 6 months against emotet-infections<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/03\/02\/cryptolaemus-and-the-fight-against-emotet\/\">Cryptolaemus and the fight against Emotet<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/07\/18\/microsoft-warnt-vor-massiver-emotet-kampagne\/\">Microsoft warns of massive Emotet campaign<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/08\/17\/emocrash-impfschutz-vor-emotet-infektionen\/\">EmoCrash protectet systems for 6 months against emotet-infections<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/09\/11\/warning-about-a-new-emotet-ransomeware-campaign-sept-2020\/\">Warning about a new Emotet-Ransomeware campaign (Sept. 2020)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/07\/18\/microsoft-warnt-vor-massiver-emotet-kampagne\/\">Microsoft warns of massive Emotet campaign<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/04\/05\/emotet-kann-computer-im-netzwerk-berhitzen\/\">Emotet Trojan can overload computers on the network<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2019\/09\/11\/emotet-cc-server-liefern-neue-schadsoftware-aus\/\">Emotet C&amp;C servers deliver new malware<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2019\/12\/07\/faq-reagieren-auf-eine-emotet-infektion\/\">FAQ: Responding to an Emotet infection<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/09\/11\/warning-about-a-new-emotet-ransomeware-campaign-sept-2020\/\">Warning about a new Emotet-Ransomeware campaign (Sept. 2020)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/11\/01\/emotet-malware-als-vermeintliches-word-update-getarnt\/\">Emotet malware comes as a supposed Word update<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/12\/22\/neu-emotet-kampagne-zu-weihnachten-2020\/\">New Emotet Campaign during the Holidays 2020<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/01\/27\/bka-infrastruktur-der-emotet-schadsoftware-bernommen-und-zerschlagen\/\">German BKA initiate a takedown of Emotet malware infrastructure<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Currently, it's reported, that the Emotet malware will automatically uninstall itself from infected systems on April 25, 2021 (1st I reported March) at 12:00 a.m CET. However, it is unclear to me who exactly is behind this action &#8211; the &hellip; <a href=\"https:\/\/borncity.com\/win\/2021\/01\/28\/emotet-reportedly-uninstalls-itself-on-march-25-2021\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580],"tags":[69],"class_list":["post-18475","post","type-post","status-publish","format-standard","hentry","category-security","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/18475","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=18475"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/18475\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=18475"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=18475"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=18475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}