General

  • Target

    OW2.exe

  • Size

    3.3MB

  • Sample

    230113-nlf4vsge73

  • MD5

    c1b752726974430ac3fec2f1455827ae

  • SHA1

    96ea20ec6509e82dd825744378c53b92d7ad230d

  • SHA256

    d4593b5e9b2a13357e52c1776acbe24990ec4d2154564bd454f53193859dae2f

  • SHA512

    acc835458d69b374e0818a42ec167d4d936f1f0d3c2527fc16226b72401353d8536a34c9b88bb8d2661dcd6f34a6a3a9e09e0243b6626bb6532113232548907a

  • SSDEEP

    98304:Ul/Kl7eRkjMa71IWV7VQhDU80HhDBfRT/R:2/2SPa757u+809d

Malware Config

Extracted

Family

eternity

C2

http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion

Wallets

113d641555b94beb8fc6e666c5499b40

Targets

    • Target

      OW2.exe

    • Size

      3.3MB

    • MD5

      c1b752726974430ac3fec2f1455827ae

    • SHA1

      96ea20ec6509e82dd825744378c53b92d7ad230d

    • SHA256

      d4593b5e9b2a13357e52c1776acbe24990ec4d2154564bd454f53193859dae2f

    • SHA512

      acc835458d69b374e0818a42ec167d4d936f1f0d3c2527fc16226b72401353d8536a34c9b88bb8d2661dcd6f34a6a3a9e09e0243b6626bb6532113232548907a

    • SSDEEP

      98304:Ul/Kl7eRkjMa71IWV7VQhDU80HhDBfRT/R:2/2SPa757u+809d

    • Eternity

      Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses Microsoft Outlook profiles

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks