MALICIOUS (1) campaign cataloged at 2024-10-07(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2024-10-fake-usreagent¶
Inside the library there is a part running code hidden in the attached image, which then exfiltrate user-provided data, downloads and install next stage code, exfiltrate TXT files and finally installs infostealers - Lumma and a custom one. Arround L110
Abuse categories¶
action-hidden-in-lib-usage
Campaign uses action-hidden-in-lib-usage.
clipboard_stealing
Campaign uses clipboard_stealing.
clons_real_package
The package is a clone of a real package, but with malicious code added.
files_exfiltration
Campaign uses files_exfiltration.
infostealer
Campaign uses infostealer.
obfuscation
Campaign uses obfuscation.
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
-
ethscanold.com
-
hxxps://ethscanold.com/ex_ewq1/2e.exe
-
hxxps://ethscanold.com/ex_ewq1/cdr2.exe
-
hxxps://ethscanold.com/r.php
-
crypto-api.net