Hi! Check out new tweet on this threat ➷
And of course I propose rules for the clipper✎
alert http any any -> any any (msg: "ET MALWARE [ANY.RUN] EternityClipper (Successful Installation)";flow: established, to_server; http.uri;content: "?install=";content: "&wallets="; distance: 0;content: "&user="; distance: 0;content: "&comp="; distance: 0;content: "&ip="; distance: 0;content: "&country="; distance: 0;content: "&city="; distance: 0; http.user_agent;content: "OnionWClient";classtype: trojan-activity;reference: md5,e94cbfc023e1e1c5da6d44d719b50319;reference: url,app.any.run/tasks/dc98848c-5576-43c2-af7f-35bd83a7aa2a; metadata: attack_target Client_Endpoint, deployment Perimeter, former_category MALWARE, signature_severity Major, malware_family EternityClipper, created_at 2023_09_22;sid: 1; rev: 1;)
alert http any any -> any any (msg: "ET MALWARE [ANY.RUN] EternityClipper (Address Change)";flow: established, to_server; http.uri;content: "?currency=";content: "&from="; distance: 0; content: "&to="; distance: 0; content: "&user="; distance: 0; content: "&comp="; distance: 0; content: "&ip="; distance: 0; content: "&country="; distance: 0; content: "&city="; distance: 0; http.user_agent;content: "OnionWClient";classtype: trojan-activity;reference: md5,e94cbfc023e1e1c5da6d44d719b50319;reference: url,app.any.run/tasks/dc98848c-5576-43c2-af7f-35bd83a7aa2a;metadata: attack_target Client_Endpoint, deployment Perimeter, former_category MALWARE, signature_severity Major, malware_family EternityClipper, created_at 2023_09_22;sid: 2; rev: 1;)
And I also suggest renaming ET MALWARE Win32/Eternity Activity (POST) to Eternity Stealer or add a new one.
It is similar to a clipper but contains /stld in the URI.
Sends ~90 kb in this example.
Best regards, Jane ☾⋆。𖦹 °✩