This web connection is then used to send spam and launch Distributed Denial of Service (DDoS) attacks.
It can also be rented out to other cybercriminals.
The update contained a clean-up routine responsible for uninstalling Emotet from infected computers with a deadline of April 25.
The global operation was announced by Europol in apress releaseon January 27 to take down the botnet.
To severely disrupt the EMOTET infrastructure, law enforcement teamed up together to create an effective operational strategy.
The infected machines of victims have been redirected towards this law enforcement-controlled infrastructure.
This is a unique and new approach to effectively disrupt the activities of the facilitators of cybercrime.
It had successfully initiated the uninstallation routine and completely removed itself from the Windows system.
Similarly, the Malware tracker site Abuse.ch too confirmed the successful removal of the malware.
TheirEmotet portalshowed none of the Emotet C2 servers it tracks were online.
Historically, Emotets operators used long breaks in activity to improve their malware.
source: www.techworm.net