General

  • Target

    c8160bcafcd6bf27d9b37ffd1985e029.exe

  • Size

    1018KB

  • Sample

    230502-ljrrgaad93

  • MD5

    c8160bcafcd6bf27d9b37ffd1985e029

  • SHA1

    fa8da691a6fddb294174eca4ee3cb222bbf3ab20

  • SHA256

    f3253a3732bc4b99f4cca79e439d9f2fb25d6a4e1a75e47228b6aa8a5175e4b4

  • SHA512

    20f80c5f6af3e8d48c89517f411e6e6820190f5fb170314e727e8e4cb42bae303ca47b1213502f8f44766ff9a4d1f7739d4f64de6914ed519376a9c421bcf041

  • SSDEEP

    12288:lToPWBv/cpGrU3y4CDFOkZdhvRH9EfIpops7SQlMDbkHB6B1rAiQ13+jxLEj2NJJ:lTbBv5rUqDFzhvxpFKUEBCjDWhvP

Malware Config

Extracted

Family

eternity

C2

http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion

Wallets

48zNQwXLksrS7S3ohbWAKRTYWu5htM4FG4sa9iz6LzgWj6ebFQzyJe9aWJbw4nsHR7KQyDrXKG6bxKQTJdj9Uhu138L9FDz

bc1q0zm2c9m7ep9j7yfmjkk382eelvkgg8m8akhej9

qqn2j7nsrncd0867hke7sej6yk3q2ey9kuve8umzux

0xF52FCCEfC7CAfed48536bf1b17B0Dff8Ee95D60B

0xF52FCCEfC7CAfed48536bf1b17B0Dff8Ee95D60B

DGvCy59BHkqydZWzr2c7qgWxrsnfHGKj5M

THG5ALgNC9uwfTC2tRWvZqJ3SgHG4Z6R8d

LiD2oz6qhJqoqH5oH2jv1ERLgvVTH1HKV8

rQKosTtwF1JWHmb6MoCrqLfBArYMsg3ZE3

t1XM4gi72v4MbLm9DM5ijhN717K5GvAt6hG

Xuzg4FNTNzX5Z1RatRHZ7QKWkPYhCaTDpK

ASFsKZ7qWizPXt97mTGrpXRpFyTJ4QHV9K

GDJ36G2L3XQMIDOX5RC2PAJ7NKKWIR2IU7TCY6WW3O7IGTCCKZUCPQ4G

7hJcKEr29NoKn25p3k7bpSYVKeGAqueUPstP6w8SDHEm

UAITL6ZCTXIZIHPBJYNNV3RO464YYLILGHZ5WXSK4QFHWROSGRBGN5Y6TU

Targets

    • Target

      c8160bcafcd6bf27d9b37ffd1985e029.exe

    • Size

      1018KB

    • MD5

      c8160bcafcd6bf27d9b37ffd1985e029

    • SHA1

      fa8da691a6fddb294174eca4ee3cb222bbf3ab20

    • SHA256

      f3253a3732bc4b99f4cca79e439d9f2fb25d6a4e1a75e47228b6aa8a5175e4b4

    • SHA512

      20f80c5f6af3e8d48c89517f411e6e6820190f5fb170314e727e8e4cb42bae303ca47b1213502f8f44766ff9a4d1f7739d4f64de6914ed519376a9c421bcf041

    • SSDEEP

      12288:lToPWBv/cpGrU3y4CDFOkZdhvRH9EfIpops7SQlMDbkHB6B1rAiQ13+jxLEj2NJJ:lTbBv5rUqDFzhvxpFKUEBCjDWhvP

    • Detects Eternity clipper

    • Eternity

      Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks