General

  • Target

    17d7d98d93aff88246a9836b600a0966

  • Size

    69KB

  • Sample

    221122-1cfsysdc2t

  • MD5

    17d7d98d93aff88246a9836b600a0966

  • SHA1

    1ba489b334fc1c4906c4ffa6b93ba3422d99832c

  • SHA256

    350bf9acd23ff9f8d05bf694bc79e0f63097c847f3eeb065709d1184255ba6df

  • SHA512

    a32f061800aaa4149ae09998fdda17a5bcfb9a6b950b43c3c71e9fd7bd3c2948d91cb4ce7249a8e8d597ac3690d475e56646b917d7b92e2d76b3848faf178058

  • SSDEEP

    1536:nXy14XbP2vRZsllUHipzm/TERc7Fpzkt7oCxBtix5:nXg4LPsKUCplREklrBt05

Score
10/10

Malware Config

Extracted

Family

eternity

C2

http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion

Wallets

3PyqR4JWaMnp9smk9xnr9DAYW4M6HcKRnV

qpmhdv2gekpscmrv4sqed2d6njcaxmkhjyrr0rjes4

0x3F508b9ED9FDb1B8A84957257Fa44DF3A9D4B1e6

0x8C0f9B8ec99f317976F703428aC2c66F5394F474

DCwDPtUXL2XHSowck7EVZi6ipwVMQk7VR6

TPxXfNnPVcrMAma1KobjmTt5wz5y8EueeK

ltc1qp64dmhcj990z349pd2hcdqgnqyguhgky4gdfdy

rDCP4X5gV7WdPv5THD5fduUeDpaijLoD2s

t1X6HZNtFz5MspayYmse65dNig4aeYaFVGr

GBVMKZZPPMQDBFPLBOAD6LXUZKPTINWSL43AO4LUMX4QLH7YCCIFVGTA

9WACN4w69kmQpjoh8AZamNBz3vVDsNKHKpJ7BcoeYCX4

53YQHFOKWJTORJ6PSMF37KL3TRAJGIAMG7LG5VQRQFOOAZHI6QMCUFTTPI

Targets

    • Target

      17d7d98d93aff88246a9836b600a0966

    • Size

      69KB

    • MD5

      17d7d98d93aff88246a9836b600a0966

    • SHA1

      1ba489b334fc1c4906c4ffa6b93ba3422d99832c

    • SHA256

      350bf9acd23ff9f8d05bf694bc79e0f63097c847f3eeb065709d1184255ba6df

    • SHA512

      a32f061800aaa4149ae09998fdda17a5bcfb9a6b950b43c3c71e9fd7bd3c2948d91cb4ce7249a8e8d597ac3690d475e56646b917d7b92e2d76b3848faf178058

    • SSDEEP

      1536:nXy14XbP2vRZsllUHipzm/TERc7Fpzkt7oCxBtix5:nXg4LPsKUCplREklrBt05

    Score
    10/10
    • Detects Eternity clipper

    • Eternity

      Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks