After months of inactivity, Emotet came back to life on Monday as it started churning out spam emails that push malicious attachments to unsuspecting users. Researchers have already started to see the botnet split into different distributions and employ new document templates designed to further trick users into enabling malicious Word macros. Some of the spam being sent out also uses WScript to execute a JScript script to install a malicious payload. Some emails are also including links that can be used to download the malicious document.
Source: https://www.bleepingcomputer.com/news/security/emotet-trojan-evolves-since-being-reawakend-here-is-what-we-know/

