FortiAnalyzer
FortiAnalyzer can receive logs and Windows host events directly from endpoints connected to EMS, and you can use FortiAnalyzer to analyze the logs and run reports.
keithli_FTNT
Staff
Staff
Article Id 200495

Description

This article describes how to use a custom Event Handler in FortiAnalyzer to detect activities related to the Emotet malware, which has been detected in spam campaigns recently.

 

What is included in Fortinet_SOC-Emotet-Malware-Detection.zip?
1. Emotet Malware_event-handler.json
This event handler helps identify exploit attempts detected by FortiGate's AV, IPS and App Control detection. Also it relies on FortiClient’s AV, Vulnerability and web filter detection as well as FortiSandbox detection. Logs triggering the event handler are generated from the FortiGate, FortiClient and FortiSandbox. Therefore, their corresponding AV signature should be kept up to date to prevent and log the exploits.

 

Scope

 

The custom Event Handler and Report provided can be used in FortiAnalyzer 6.4+.

 

Solution

All screenshots provided below for illustration purposes are taken from FortiAnalyzer 6.4.4.
1) Download the Fortinet_SOC-Emotet-Malware-Detection.zip file (contains 1 file)
2) Unzip Fortinet_SOC-Emotet-Malware-Detection.zip
3) Use Emotet Malware_event-handler.json to import into Event Handlers
     a. Choose an ADOM (if ADOMs are enabled)
     b. Choose the FortiSOC module
     c. Select Event Handler List
     d. Select the Import option under "More"
     e. Select Emotet Malware_event-handler.json

EventHandlerList-FortiDemo.png
Result: Emotet Malware_event-handler.json is enabled and will be triggered if the appropriate logs are received after the event handler was imported

Contributors