EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company
A Chinese APT group compromised a Philippine military company using a new, fileless malware framework called EggStreme. This sophisticated multi-stage toolset achieves persistent, low-profile espionage by injecting malicious code directly into memory and leveraging DLL sideloading. The core component, EggStremeAgent, is a full-featured backdoor enabling extensive system reconnaissance, lateral movement, and data theft via an injected keylogger. The attack begins with EggStremeFuel deploying EggStremeLoader to set up a persistent service, which then executes EggStremeReflectiveLoader to launch EggStremeAgent. The framework's fileless nature and use of legitimate Windows processes make it difficult to detect, posing a significant and persistent threat.
AI Analysis
Technical Summary
EggStreme is a sophisticated, multi-stage Advanced Persistent Threat (APT) malware framework attributed to a Chinese threat actor targeting a Philippine military company. This framework is notable for its fileless nature, which means it operates primarily in memory without writing malicious files to disk, significantly complicating detection by traditional antivirus and endpoint detection systems. The attack chain begins with EggStremeFuel, which deploys EggStremeLoader to establish persistence by creating a persistent Windows service. This service then executes EggStremeReflectiveLoader, which loads the core backdoor component, EggStremeAgent, directly into memory using DLL sideloading techniques. DLL sideloading abuses legitimate Windows processes by tricking them into loading malicious DLLs, thereby evading detection and security controls. EggStremeAgent provides extensive capabilities including system reconnaissance, lateral movement within the network, and data exfiltration. It also includes an injected keylogger (EggStremeKeylogger) to capture sensitive input data. The framework leverages multiple MITRE ATT&CK techniques such as credential dumping (T1003), process injection (T1055), service creation for persistence (T1543.003), and lateral movement via remote services (T1021.002). The use of legitimate Windows processes combined with fileless execution and DLL sideloading makes EggStreme a stealthy and persistent espionage tool, designed for long-term infiltration and data theft. The campaign’s targeting of a military entity underscores its strategic espionage intent.
Potential Impact
For European organizations, the direct impact of EggStreme may currently be limited given the initial targeting of a Philippine military company. However, the techniques and framework employed by EggStreme represent a significant threat model that could be adapted or redeployed against European military, defense contractors, or critical infrastructure entities. The fileless nature and DLL sideloading tactics allow attackers to bypass many traditional detection mechanisms, increasing the risk of prolonged undetected intrusions. If adapted to European targets, EggStreme could facilitate extensive espionage, data theft, and lateral movement within sensitive networks, potentially compromising national security interests and critical defense operations. The presence of an injected keylogger also raises concerns about credential theft and further network compromise. European organizations involved in defense, government, or critical infrastructure sectors should be aware of this threat framework as it exemplifies advanced techniques that could be leveraged against them in future campaigns.
Mitigation Recommendations
1. Implement advanced endpoint detection and response (EDR) solutions capable of detecting fileless malware behaviors, such as anomalous process injections and unusual DLL loading patterns. 2. Monitor and restrict the creation and execution of new Windows services, especially those created by non-administrative users or unusual processes. 3. Employ application whitelisting and code integrity policies to prevent unauthorized DLL sideloading and execution of untrusted code within legitimate processes. 4. Conduct regular memory forensics and behavioral analysis to detect in-memory malicious code and suspicious process activities. 5. Harden credential management by enforcing multi-factor authentication and monitoring for credential dumping attempts. 6. Network segmentation and strict access controls to limit lateral movement opportunities within the network. 7. Continuous threat hunting focusing on MITRE ATT&CK techniques used by EggStreme, such as process injection, service creation, and keylogging activities. 8. Regularly update and patch systems to reduce the attack surface, even though EggStreme is fileless, vulnerabilities in legitimate processes can be exploited for DLL sideloading. 9. Train security teams to recognize signs of fileless malware and advanced persistent threats, emphasizing the importance of memory and behavioral analysis.
Affected Countries
Philippines, United Kingdom, France, Germany, Italy, Poland
Indicators of Compromise
- hash: 03ab706b45b1190c1f14059a2b443b13
- hash: 0f37cd2f6b40649b82ba4f1921cd504b
- hash: 0f45e73eccdb485e662c49fbd4821324
- hash: 16c95842bedc3c4d1df053ea9ae188d7
- hash: 2a2900a9792f8020a9deda0d676fe989
- hash: 3ca1b4542c44834839149e080e5c0498
- hash: 537299a4e6c0f286c8a33fb444846a85
- hash: 5e3b763a9ba153edade783e8a0303177
- hash: 63a4fbb304ce66ba2b8e87fae96ab35a
- hash: 7392c09e0ac355e15b2d1236e62b6a57
- hash: 792005181a433afc9f7a8c230dcf4dfa
- hash: 7de52573ebe4073fa97fc72d9b6a9b7a
- hash: 7ec144401e983edbb5196699773c3660
- hash: 8232e0c75f4ddc01cf846646f484ab43
- hash: 8843ff02ebc51afb3c3873d97c0b9846
- hash: 95472a444f9b1120b7f31945202010c0
- hash: 97bef0d9a2ad4249db2214fd43b5353a
- hash: a39d496e84f74c2ef5437389358f1521
- hash: a43b957ef22072fc0b213989ab15560d
- hash: a5fcd07b4cfba212af7e76fe88212ad7
- hash: a69908de2c1903afb41f0c7fb14162fd
- hash: aec8a3511907d8a27aa8082869ae80c4
- hash: b7926de548c9c139dada2cff62cf3711
- hash: b9bd98484c186f47999bf328bb34794c
- hash: bae6b54f98bb23ddbb69487f8abfcd8c
- hash: bf89b83267a9debc7b61ccb04cd329a5
- hash: c180e98725a466c3208e2c8874abc1ed
- hash: c1fdabb61c941053c2272c8c147670d1
- hash: df29898c0742f6b0175e4e34b5f0755d
- hash: df2e68fe6be163d40a21b4199033b434
- hash: e3d8fbf45fac3793aac87568a1919cf7
- hash: e59eaab989c5a8433852e77fb9dd7986
- hash: eb4948c42f418325c1b8b2b79af7ef08
- ip: 103.103.0.225
- ip: 103.131.95.114
- ip: 103.169.90.164
- ip: 103.78.242.128
- sslcertfingerprint: 51:65:5e:8e:97:fc:72:65:b1:aa:a4:26:5d:94:e2:f7:ca:e9:c9:13
- sslcertfingerprint: 64:30:42:df:50:ce:f0:80:e4:48:51:e7:d5:d6:f6:54:f7:72:eb:c5
- domain: fetraa.com
- domain: fionamcleod.net
- domain: powerontheroad.org
- domain: safiasol.com
- domain: sealtribute.org
- domain: sinhluc.net
- domain: theuklg.com
- domain: traveldog.org
EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company
Description
A Chinese APT group compromised a Philippine military company using a new, fileless malware framework called EggStreme. This sophisticated multi-stage toolset achieves persistent, low-profile espionage by injecting malicious code directly into memory and leveraging DLL sideloading. The core component, EggStremeAgent, is a full-featured backdoor enabling extensive system reconnaissance, lateral movement, and data theft via an injected keylogger. The attack begins with EggStremeFuel deploying EggStremeLoader to set up a persistent service, which then executes EggStremeReflectiveLoader to launch EggStremeAgent. The framework's fileless nature and use of legitimate Windows processes make it difficult to detect, posing a significant and persistent threat.
AI-Powered Analysis
Technical Analysis
EggStreme is a sophisticated, multi-stage Advanced Persistent Threat (APT) malware framework attributed to a Chinese threat actor targeting a Philippine military company. This framework is notable for its fileless nature, which means it operates primarily in memory without writing malicious files to disk, significantly complicating detection by traditional antivirus and endpoint detection systems. The attack chain begins with EggStremeFuel, which deploys EggStremeLoader to establish persistence by creating a persistent Windows service. This service then executes EggStremeReflectiveLoader, which loads the core backdoor component, EggStremeAgent, directly into memory using DLL sideloading techniques. DLL sideloading abuses legitimate Windows processes by tricking them into loading malicious DLLs, thereby evading detection and security controls. EggStremeAgent provides extensive capabilities including system reconnaissance, lateral movement within the network, and data exfiltration. It also includes an injected keylogger (EggStremeKeylogger) to capture sensitive input data. The framework leverages multiple MITRE ATT&CK techniques such as credential dumping (T1003), process injection (T1055), service creation for persistence (T1543.003), and lateral movement via remote services (T1021.002). The use of legitimate Windows processes combined with fileless execution and DLL sideloading makes EggStreme a stealthy and persistent espionage tool, designed for long-term infiltration and data theft. The campaign’s targeting of a military entity underscores its strategic espionage intent.
Potential Impact
For European organizations, the direct impact of EggStreme may currently be limited given the initial targeting of a Philippine military company. However, the techniques and framework employed by EggStreme represent a significant threat model that could be adapted or redeployed against European military, defense contractors, or critical infrastructure entities. The fileless nature and DLL sideloading tactics allow attackers to bypass many traditional detection mechanisms, increasing the risk of prolonged undetected intrusions. If adapted to European targets, EggStreme could facilitate extensive espionage, data theft, and lateral movement within sensitive networks, potentially compromising national security interests and critical defense operations. The presence of an injected keylogger also raises concerns about credential theft and further network compromise. European organizations involved in defense, government, or critical infrastructure sectors should be aware of this threat framework as it exemplifies advanced techniques that could be leveraged against them in future campaigns.
Mitigation Recommendations
1. Implement advanced endpoint detection and response (EDR) solutions capable of detecting fileless malware behaviors, such as anomalous process injections and unusual DLL loading patterns. 2. Monitor and restrict the creation and execution of new Windows services, especially those created by non-administrative users or unusual processes. 3. Employ application whitelisting and code integrity policies to prevent unauthorized DLL sideloading and execution of untrusted code within legitimate processes. 4. Conduct regular memory forensics and behavioral analysis to detect in-memory malicious code and suspicious process activities. 5. Harden credential management by enforcing multi-factor authentication and monitoring for credential dumping attempts. 6. Network segmentation and strict access controls to limit lateral movement opportunities within the network. 7. Continuous threat hunting focusing on MITRE ATT&CK techniques used by EggStreme, such as process injection, service creation, and keylogging activities. 8. Regularly update and patch systems to reduce the attack surface, even though EggStreme is fileless, vulnerabilities in legitimate processes can be exploited for DLL sideloading. 9. Train security teams to recognize signs of fileless malware and advanced persistent threats, emphasizing the importance of memory and behavioral analysis.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.bitdefender.com/en-us/blog/businessinsights/eggstreme-fileless-malware-cyberattack-apac"]
- Adversary
- null
- Pulse Id
- 68c1d94aeea0cbf6a74fd693
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash03ab706b45b1190c1f14059a2b443b13 | — | |
hash0f37cd2f6b40649b82ba4f1921cd504b | — | |
hash0f45e73eccdb485e662c49fbd4821324 | — | |
hash16c95842bedc3c4d1df053ea9ae188d7 | — | |
hash2a2900a9792f8020a9deda0d676fe989 | — | |
hash3ca1b4542c44834839149e080e5c0498 | — | |
hash537299a4e6c0f286c8a33fb444846a85 | — | |
hash5e3b763a9ba153edade783e8a0303177 | — | |
hash63a4fbb304ce66ba2b8e87fae96ab35a | — | |
hash7392c09e0ac355e15b2d1236e62b6a57 | — | |
hash792005181a433afc9f7a8c230dcf4dfa | — | |
hash7de52573ebe4073fa97fc72d9b6a9b7a | — | |
hash7ec144401e983edbb5196699773c3660 | — | |
hash8232e0c75f4ddc01cf846646f484ab43 | — | |
hash8843ff02ebc51afb3c3873d97c0b9846 | — | |
hash95472a444f9b1120b7f31945202010c0 | — | |
hash97bef0d9a2ad4249db2214fd43b5353a | — | |
hasha39d496e84f74c2ef5437389358f1521 | — | |
hasha43b957ef22072fc0b213989ab15560d | — | |
hasha5fcd07b4cfba212af7e76fe88212ad7 | — | |
hasha69908de2c1903afb41f0c7fb14162fd | — | |
hashaec8a3511907d8a27aa8082869ae80c4 | — | |
hashb7926de548c9c139dada2cff62cf3711 | — | |
hashb9bd98484c186f47999bf328bb34794c | — | |
hashbae6b54f98bb23ddbb69487f8abfcd8c | — | |
hashbf89b83267a9debc7b61ccb04cd329a5 | — | |
hashc180e98725a466c3208e2c8874abc1ed | — | |
hashc1fdabb61c941053c2272c8c147670d1 | — | |
hashdf29898c0742f6b0175e4e34b5f0755d | — | |
hashdf2e68fe6be163d40a21b4199033b434 | — | |
hashe3d8fbf45fac3793aac87568a1919cf7 | — | |
hashe59eaab989c5a8433852e77fb9dd7986 | — | |
hasheb4948c42f418325c1b8b2b79af7ef08 | — |
Ip
Value | Description | Copy |
---|---|---|
ip103.103.0.225 | CC=PH ASN=AS23930 ip-converge data center | |
ip103.131.95.114 | CC=PH ASN=AS17448 web.com | |
ip103.169.90.164 | CC=MY ASN=AS55720 gigabit hosting sdn bhd | |
ip103.78.242.128 | CC=MY ASN=AS135542 light cloud technology |
Sslcertfingerprint
Value | Description | Copy |
---|---|---|
sslcertfingerprint51:65:5e:8e:97:fc:72:65:b1:aa:a4:26:5d:94:e2:f7:ca:e9:c9:13 | — | |
sslcertfingerprint64:30:42:df:50:ce:f0:80:e4:48:51:e7:d5:d6:f6:54:f7:72:eb:c5 | — |
Domain
Value | Description | Copy |
---|---|---|
domainfetraa.com | — | |
domainfionamcleod.net | — | |
domainpowerontheroad.org | — | |
domainsafiasol.com | — | |
domainsealtribute.org | — | |
domainsinhluc.net | — | |
domaintheuklg.com | — | |
domaintraveldog.org | — |
Threat ID: 68c1dc6c12193b50d300065c
Added to database: 9/10/2025, 8:15:40 PM
Last enriched: 9/10/2025, 8:31:00 PM
Last updated: 9/11/2025, 12:02:48 AM
Views: 5
Related Threats
Technical Analysis of kkRAT
MediumLearn about ChillyHell, a modular Mac backdoor
MediumAdaptixC2: A New Open-Source Framework Leveraged in Real-World Attacks
MediumChinese APT Hits Philippine Military Firm with New EggStreme Fileless Malware
MediumChina-Linked APT41 Hackers Target U.S. Trade Officials Amid 2025 Negotiations
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.