
| Names | TerraPreter | |
| Category | Malware | |
| Type | Loader | |
| Description | (ESET) Evilnum group also uses 64-bit executables that decrypt and run a Meterpreter instance in memory. The use of Meterpreter gives them flexibility and the ability to run various payloads in a stealthy and extensible way. The structure of these components and the integrity checks implemented were identified as TerraLoader (More_eggs) code. That’s why we refer to these components as TerraPreter. | |
| Information | <https://www.welivesecurity.com/2020/07/09/more-evil-deep-look-evilnum-toolset/> | |
| Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.terrapreter> | |
Last change to this tool card: 24 April 2021
Download this tool card in JSON format
| Changed | Name | Country | Observed | ||
APT groups | |||||
| Evilnum | [Unknown] | 2018-2022 | |||
| Venom Spider, Golden Chickens | 2017-Jan 2025 | ||||
2 groups listed (2 APT, 0 other, 0 unknown)
|
Digital Service Security Center Follow us on |
Report incidents |
|
| +66 (0)2-123-1227 | ||
| [email protected] | ||