Names | TerraPreter | |
Category | Malware | |
Type | Loader | |
Description | (ESET) Evilnum group also uses 64-bit executables that decrypt and run a Meterpreter instance in memory. The use of Meterpreter gives them flexibility and the ability to run various payloads in a stealthy and extensible way. The structure of these components and the integrity checks implemented were identified as TerraLoader (More_eggs) code. That’s why we refer to these components as TerraPreter. | |
Information | <https://www.welivesecurity.com/2020/07/09/more-evil-deep-look-evilnum-toolset/> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.terrapreter> |
Last change to this tool card: 24 April 2021
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
Evilnum | [Unknown] | 2018-2022 | |||
Venom Spider, Golden Chickens | 2017-Feb 2019 |
2 groups listed (2 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |