[Security] Try using the Emotet infection confirmation tool "EmoCheck" [Tool]
This is Ohara from the technical sales department.
This time, I used the security check tool "EmoCheck" to check whether my PC terminal was infected with "Emotet".
(Information as of May 2022)
In addition, the following articles were used as reference in creating this article.
https://www.keishicho.metro.tokyo.lg.jp/kurashi/cyber/joho/emotet.html
https://blogs.jpcert.or.jp/ja/2019/12/emotetfaq.html
About Emotet
Emotet is a highly contagious malware whose main infection route is through malicious email attachments sent by malicious attackers.
In the unlikely event that Emotet is infected, the attacker will collect the account information, passwords, address books, email history, etc. of the users of the infected PC terminal. Attackers who have collected this information can generate ``spoofed emails'' and spread them to other email recipients, causing various damage.
How to download, operate, and check “EmoCheck”
https://github.com/JPCERTCC/EmoCheck/releases in the address bar of your web browser to be redirected to the "github" page.
② Download the exe file suitable for the environment and version of your PC terminal from the github page.
③ After downloading and installing the exe file, a screen like the one below will immediately appear. If there are no problems, "Emotet was not detected." will be displayed.
*If sentences such as "Emotet process was found" or "Emotet was detected" are displayed on the screen in step 3 above, click [ https://blogs.jpcert.or.jp/ja/ 2019/12/emotetfaq.html ] You need to follow the steps in "2-1-3. What to do in case of infection".
summary
The above is how to operate and check "EmoCheck".
We also recommend that you do not click on emails, files, or links that you do not recognize or trust, and that you install anti-malware/removal software on your PC to strengthen security.