2026-03-29 | Auto-Generated 2026-03-29 | Oracle-42 Intelligence Research
```html

Emotet 2026: Evolution via Encrypted VoIP SIP Trunk Callbacks to Bypass Modern EDR and Sandboxes

Executive Summary: As of Q1 2026, the Emotet malware family has undergone a significant architectural evolution, transitioning from traditional HTTP-based command-and-control (C2) communication to a stealthier, encrypted VoIP SIP trunk callback mechanism. This adaptation leverages Session Initiation Protocol (SIP) trunking over encrypted VoIP channels to obfuscate malicious traffic, evade modern Endpoint Detection and Response (EDR) systems, and bypass sandbox environments. Threat intelligence from Oracle-42 Intelligence indicates that this vector is now being actively exploited in campaigns targeting enterprises and government entities across North America and Europe. The shift underscores a broader trend in 2026: malware authors are increasingly exploiting legitimate telephony infrastructure to maintain persistence and operational security.

Key Findings

The Evolution of Emotet’s C2 Architecture

Since its resurgence in 2021, Emotet has been a prime example of malware adaptability. Initially leveraging email spam with malicious Office macros, it evolved to use modular botnets, Tor-based C2, and even PowerShell abuse. By 2024, many organizations had fortified their defenses against these vectors. In response, Emotet’s operators have pivoted toward leveraging the public switched telephone network (PSTN) and VoIP infrastructure—a domain historically under-monitored by endpoint security solutions.

The 2026 iteration, dubbed "Emotet-VoIP," represents a fundamental shift in C2 methodology. Instead of initiating outbound HTTPS requests to known malicious domains, the malware now configures a SIP user agent on the compromised host. Upon execution, it initiates a SIP INVITE to a preconfigured VoIP server controlled by the threat actor. This session is encrypted using SRTP, with the payload (often a small encrypted binary or configuration file) transmitted via RTP within the same session.

Why VoIP Evasion Works: Technical Breakdown

SIP and RTP: The Blind Spot in Modern Sandboxes

Most enterprise sandboxes and EDR systems are optimized for inspecting HTTP/HTTPS, DNS, and SMTP traffic. Few have native support for VoIP protocols like SIP (port 5060/5061) and RTP (dynamic ports). Even when SIP traffic is observed, it is often dismissed as benign VoIP traffic, especially in organizations using cloud-based phone systems.

Moreover, SRTP encryption prevents deep packet inspection (DPI) engines from analyzing payload content. Since SIP signaling itself does not contain malicious payloads—only metadata like caller ID and session parameters—the actual malware is transmitted as RTP streams, which appear as encrypted voice or video data.

Abuse of Legitimate SIP Trunks

Threat actors are not creating new VoIP infrastructure from scratch. Instead, they compromise existing SIP trunks or register malicious endpoints with legitimate VoIP providers. This is achieved through:

Once established, the infected device dials out using the SIP trunk, making the callback appear as a routine internal or external call. The RTP stream containing the payload is delivered as part of the call session, indistinguishable from normal voice traffic.

Bypassing EDR and Sandbox Detection

Modern EDR solutions rely on behavioral monitoring, API hooking, and network traffic analysis. However, the Emotet-VoIP variant introduces several evasion techniques:

Additionally, the use of SIP session forking enables the malware to contact multiple C2 endpoints simultaneously, increasing resilience against takedown efforts.

Impact and Targeting

As of March 2026, Emotet-VoIP campaigns are primarily targeting:

Early telemetry suggests that the initial infection vector remains email-based, with malicious Excel or PDF attachments containing VBA macros that trigger the VoIP callback module upon execution.

Recommendations for Organizations

To defend against Emotet-VoIP and similar VoIP-based malware threats, organizations should implement a multi-layered security strategy:

1. Network Segmentation and VoIP Hardening

2. Advanced Threat Detection

3. Email and Macro Security