MALICIOUS (1) campaign cataloged at 2024-10-07(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2024-10-fake-usreagent¶
Inside the library there is a part running code hidden in the attached image, which then exfiltrate user-provided data, downloads and install next stage code, exfiltrate TXT files and finally installs infostealers - Lumma and a custom one. Arround L110
Abuse categories¶
action-hidden-in-lib-usage
The malicious action is hidden in the code and starts when user interacts with it (e.g. during class initialization or by exfiltrating given credentials).
clipboard_stealing
Campaign uses clipboard_stealing.
clones_real_package
The package is a clone of a legitimate package or library, but with malicious code added.
files_exfiltration
Campaign uses files_exfiltration.
infostealer
Activity is typical for information stealers, i.e. by exfiltrate various sensitive data from the victim's environment.
obfuscation
Code uses obfuscation techniques to hide its true purpose.
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
-
ethscanold.com -
hxxps://ethscanold.com/ex_ewq1/2e.exe -
hxxps://ethscanold.com/ex_ewq1/cdr2.exe -
hxxps://ethscanold.com/r.php -
crypto-api.net