Created on 03-23-2023 10:51 PM Edited on 03-24-2023 09:41 AM
| Description |
This article describes how to use a custom event handler in FortiAnalyzer to raise alerts for incident response related to attacks that attempt to leverage the Emotet Malware Resurgence. A report is also provided to gain historical visibility into the logs. |
| Scope |
This article contains the files necessary to load an event handler and report into the FortiAnalyzer for either a Fabric ADOM or a FortiGate ADOM. The Fabric report and event handler leverage logs from other Fortinet products that can be used to detect the attack in addition to FortiGate logs.
For more information about this attack, see the following FortiGuard Outbreak Alert: |
| Solution |
What is included in Fortinet_Emotet Malware Resurgence.zip:
1) Emotet Malware Resurgence_event-handler.json This event handler helps identify Emotet Malware Resurgence detected by FortiGates and other Fortinet products.
2) Emotet Malware Resurgence_report.dat This report displays the findings on Emotet Malware Resurgence attacks from FortiGates and other Fortinet products.
3) fgt_Emotet Malware Resurgence_event-handler.json The event handler for FortiGate ADOMs is configured for FortiGate logs only.
4) fgt_Emotet Malware Resurgence_report.dat The report for FortiGate ADOMs includes FortiGate charts only.
Steps: 1) Download the Fortinet_Emotet Malware Resurgence.zip file (contains 4 files).
2) Unzip Fortinet_Emotet Malware Resurgence.zip.
3) Import Emotet Malware Resurgence_event-handler.json or fgt_Emotet Malware Resurgence_event-handler.json event handler: - Choose an ADOM (if ADOMs are enabled). The ADOM may be of type Fabric or FortiGate:
- Choose the FortiSOC module. - Select Event Handler List. - Select the Import option under More. - Select the appropriate event handler depending on the ADOM type.
Result: The event handler is enabled and will be triggered if the appropriate logs are received following the import of the event handler. Edit the event handler to customize the notification section.
4) Import Emotet Malware Resurgence_report.dat or fgt_Emotet Malware Resurgence_report.dat to Reports:
- Choose an ADOM (if ADOMs are enabled). ADOM may be of type Fabric or FortiGate. - Select the appropriate file for the ADOM type to add the report to the ADOM.
Result: The Emotet Malware Resurgence_report can be run anytime as determined by an admin user. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.