Skip to main content

EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company

Medium
Published: Wed Sep 10 2025 (09/10/2025, 20:02:18 UTC)
Source: AlienVault OTX General

Description

A Chinese APT group compromised a Philippine military company using a new, fileless malware framework called EggStreme. This sophisticated multi-stage toolset achieves persistent, low-profile espionage by injecting malicious code directly into memory and leveraging DLL sideloading. The core component, EggStremeAgent, is a full-featured backdoor enabling extensive system reconnaissance, lateral movement, and data theft via an injected keylogger. The attack begins with EggStremeFuel deploying EggStremeLoader to set up a persistent service, which then executes EggStremeReflectiveLoader to launch EggStremeAgent. The framework's fileless nature and use of legitimate Windows processes make it difficult to detect, posing a significant and persistent threat.

AI-Powered Analysis

AILast updated: 09/10/2025, 20:31:00 UTC

Technical Analysis

EggStreme is a sophisticated, multi-stage Advanced Persistent Threat (APT) malware framework attributed to a Chinese threat actor targeting a Philippine military company. This framework is notable for its fileless nature, which means it operates primarily in memory without writing malicious files to disk, significantly complicating detection by traditional antivirus and endpoint detection systems. The attack chain begins with EggStremeFuel, which deploys EggStremeLoader to establish persistence by creating a persistent Windows service. This service then executes EggStremeReflectiveLoader, which loads the core backdoor component, EggStremeAgent, directly into memory using DLL sideloading techniques. DLL sideloading abuses legitimate Windows processes by tricking them into loading malicious DLLs, thereby evading detection and security controls. EggStremeAgent provides extensive capabilities including system reconnaissance, lateral movement within the network, and data exfiltration. It also includes an injected keylogger (EggStremeKeylogger) to capture sensitive input data. The framework leverages multiple MITRE ATT&CK techniques such as credential dumping (T1003), process injection (T1055), service creation for persistence (T1543.003), and lateral movement via remote services (T1021.002). The use of legitimate Windows processes combined with fileless execution and DLL sideloading makes EggStreme a stealthy and persistent espionage tool, designed for long-term infiltration and data theft. The campaign’s targeting of a military entity underscores its strategic espionage intent.

Potential Impact

For European organizations, the direct impact of EggStreme may currently be limited given the initial targeting of a Philippine military company. However, the techniques and framework employed by EggStreme represent a significant threat model that could be adapted or redeployed against European military, defense contractors, or critical infrastructure entities. The fileless nature and DLL sideloading tactics allow attackers to bypass many traditional detection mechanisms, increasing the risk of prolonged undetected intrusions. If adapted to European targets, EggStreme could facilitate extensive espionage, data theft, and lateral movement within sensitive networks, potentially compromising national security interests and critical defense operations. The presence of an injected keylogger also raises concerns about credential theft and further network compromise. European organizations involved in defense, government, or critical infrastructure sectors should be aware of this threat framework as it exemplifies advanced techniques that could be leveraged against them in future campaigns.

Mitigation Recommendations

1. Implement advanced endpoint detection and response (EDR) solutions capable of detecting fileless malware behaviors, such as anomalous process injections and unusual DLL loading patterns. 2. Monitor and restrict the creation and execution of new Windows services, especially those created by non-administrative users or unusual processes. 3. Employ application whitelisting and code integrity policies to prevent unauthorized DLL sideloading and execution of untrusted code within legitimate processes. 4. Conduct regular memory forensics and behavioral analysis to detect in-memory malicious code and suspicious process activities. 5. Harden credential management by enforcing multi-factor authentication and monitoring for credential dumping attempts. 6. Network segmentation and strict access controls to limit lateral movement opportunities within the network. 7. Continuous threat hunting focusing on MITRE ATT&CK techniques used by EggStreme, such as process injection, service creation, and keylogging activities. 8. Regularly update and patch systems to reduce the attack surface, even though EggStreme is fileless, vulnerabilities in legitimate processes can be exploited for DLL sideloading. 9. Train security teams to recognize signs of fileless malware and advanced persistent threats, emphasizing the importance of memory and behavioral analysis.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.bitdefender.com/en-us/blog/businessinsights/eggstreme-fileless-malware-cyberattack-apac"]
Adversary
null
Pulse Id
68c1d94aeea0cbf6a74fd693
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash03ab706b45b1190c1f14059a2b443b13
hash0f37cd2f6b40649b82ba4f1921cd504b
hash0f45e73eccdb485e662c49fbd4821324
hash16c95842bedc3c4d1df053ea9ae188d7
hash2a2900a9792f8020a9deda0d676fe989
hash3ca1b4542c44834839149e080e5c0498
hash537299a4e6c0f286c8a33fb444846a85
hash5e3b763a9ba153edade783e8a0303177
hash63a4fbb304ce66ba2b8e87fae96ab35a
hash7392c09e0ac355e15b2d1236e62b6a57
hash792005181a433afc9f7a8c230dcf4dfa
hash7de52573ebe4073fa97fc72d9b6a9b7a
hash7ec144401e983edbb5196699773c3660
hash8232e0c75f4ddc01cf846646f484ab43
hash8843ff02ebc51afb3c3873d97c0b9846
hash95472a444f9b1120b7f31945202010c0
hash97bef0d9a2ad4249db2214fd43b5353a
hasha39d496e84f74c2ef5437389358f1521
hasha43b957ef22072fc0b213989ab15560d
hasha5fcd07b4cfba212af7e76fe88212ad7
hasha69908de2c1903afb41f0c7fb14162fd
hashaec8a3511907d8a27aa8082869ae80c4
hashb7926de548c9c139dada2cff62cf3711
hashb9bd98484c186f47999bf328bb34794c
hashbae6b54f98bb23ddbb69487f8abfcd8c
hashbf89b83267a9debc7b61ccb04cd329a5
hashc180e98725a466c3208e2c8874abc1ed
hashc1fdabb61c941053c2272c8c147670d1
hashdf29898c0742f6b0175e4e34b5f0755d
hashdf2e68fe6be163d40a21b4199033b434
hashe3d8fbf45fac3793aac87568a1919cf7
hashe59eaab989c5a8433852e77fb9dd7986
hasheb4948c42f418325c1b8b2b79af7ef08

Ip

ValueDescriptionCopy
ip103.103.0.225
CC=PH ASN=AS23930 ip-converge data center
ip103.131.95.114
CC=PH ASN=AS17448 web.com
ip103.169.90.164
CC=MY ASN=AS55720 gigabit hosting sdn bhd
ip103.78.242.128
CC=MY ASN=AS135542 light cloud technology

Sslcertfingerprint

ValueDescriptionCopy
sslcertfingerprint51:65:5e:8e:97:fc:72:65:b1:aa:a4:26:5d:94:e2:f7:ca:e9:c9:13
sslcertfingerprint64:30:42:df:50:ce:f0:80:e4:48:51:e7:d5:d6:f6:54:f7:72:eb:c5

Domain

ValueDescriptionCopy
domainfetraa.com
domainfionamcleod.net
domainpowerontheroad.org
domainsafiasol.com
domainsealtribute.org
domainsinhluc.net
domaintheuklg.com
domaintraveldog.org

Threat ID: 68c1dc6c12193b50d300065c

Added to database: 9/10/2025, 8:15:40 PM

Last enriched: 9/10/2025, 8:31:00 PM

Last updated: 9/11/2025, 12:02:48 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats