EmoCheck - Emotet Detection Tool For Windows OS
Emotet detection tool for Windows OS.
How to use
- Download EmoCheck from the Releases page.
- Run EmoCheck on the host.
- Check the exported report.
Download
Please download from the Releases page.
Command options
(since v0.0.2)
- Specify output directory for the report (default: current directory)
/output [your output directory]
or-output [your output directory]
- No console output
/quiet
or-quiet
- Export the report in JSON style
/json
or-json
- Debug mode (no report)
/debug
or-debug
- Show help
/help
or-help
How EmoCheck detects Emotet
(v0.0.1)
Emotet generates their process name from a specific word dictionary and C drive serial number. EmoCheck scans the running process on the host, and find Emotet process from their process name.
(added in v0.0.2)
Emotet keeps their encoded process name in a specific registry key. EmoCheck looks up and decode the registry value, and find it from the process list. Code Signing with Microsoft Authenticode.
(added in v1.0)
Support the April 2020 updated of Emotet.
Obfuscated code.
(added in v2.0)
Support the December 2020 updated of Emotet.
French language support. (Thanks to CERT-FR)
Sample Report
Text stlye:
[Emocheck v0.0.2]Scan time: 2020-02-10 13:06:20____________________________________________________[Result]Detected Emotet process.[Emotet Process] Process Name : mstask.exe Process ID : 716 Image Path : C:\Users\[username]\AppData\Local\mstask.exe____________________________________________________Please remove or isolate the suspicious execution file.
JSON style (added in v0.0.2):
{ "scan_time":"2020-02-10 13:06:20", "hostname":"[your hostname]", "emocheck_version":"0.0.2", "is_infected":"yes", "emotet_processes":[ { "process_name":"mstask.exe", "process_id":"716", "image_path":"C:\\Users\\[username]\\AppData\\Local\\mstask.exe" } ]}
The report will be exported to the following path.
(v0.0.1)
[current directory]\yyyymmddhhmmss_emocheck.txt
(since v0.0.2)
[output path]\[computer name]_yyyymmddhhmmss_emocheck.txt
[output path]\[computer name]_yyyymmddhhmmss_emocheck.json
Screenshot
(v0.0.1)
Releases
- (Feb. 3, 2020) v0.0.1
- Initial release
- (Feb. 10, 2020) v0.0.2
- update detecting method
- add options
- (Aug. 11, 2020) v1.0.0
- update detecting method
- (Jan. 27, 2021) v2.0.0
- update detecting method
- Added French language support
- (Mar. 4, 2022) v2.1.0
- update detecting method
- (Mar. 14, 2022) v2.1.1
- Fixed a crash bug when executing with SYSTEM privileges
- (Apr. 22, 2022) v2.2.0
- update detecting method
- (May. 20, 2022) v2.3.0
- update detecting method
- (May. 24, 2022) v2.3.1
- fixed a detection pattern
- (May. 27, 2022) v2.3.2
- fixed a detection pattern
License
Please read the LICENSE page.
Notes
Tested environments
- Windows 11 21H2 64bit Japanese Edition
- Windows 10 21H2 64bit Japanese Edition
- Windows 8.1 64bit Japanese Edition
Windows 7 SP1 32bit Japanese EditionWindows 7 SP1 64bit Japanese Edition
Windows 7 does not support UTF-8 output in the Command Prompt.
Build
- Windows 10 1809 64bit Japanese Edition
- Microsoft Visual Studio Community 2017
Source code
Not published from v2.1.
Source: www.kitploit.com