Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

EtherRAT & SYS_INFO Module: C2 on Ethereum (EtherHiding), Target Selection, CDN-Like Beacons

0
Medium
Published: Thu Mar 26 2026 (03/26/2026, 21:08:19 UTC)
Source: AlienVault OTX General

Description

EtherRAT is a Node. js-based backdoor malware linked to a North Korean APT group, detected in a retail environment. It enables arbitrary command execution, extensive system information gathering, and asset theft. The malware uses a novel technique called 'EtherHiding' to store its command-and-control (C2) addresses within Ethereum smart contracts, enhancing resilience against takedown efforts. Communication with C2 servers mimics CDN-like beaconing to evade detection by blending with normal network traffic. Initial infection vectors include social engineering via ClickFix and IT support scams conducted over Microsoft Teams. A SYS_INFO module performs detailed host fingerprinting, collecting hardware, software, and network data to select valuable targets. The malware also checks for CIS (Commonwealth of Independent States) languages and self-destructs if detected, indicating a targeted exclusion. This threat poses a medium severity risk due to its stealth, persistence, and data theft capabilities.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 22:00:53 UTC

Technical Analysis

EtherRAT is a sophisticated backdoor malware implemented in Node.js and attributed to a North Korean advanced persistent threat (APT) group. It was discovered in a retail customer environment and is designed to provide attackers with arbitrary command execution capabilities, enabling them to run any commands on the compromised host. The malware includes a SYS_INFO module that performs comprehensive host fingerprinting, collecting detailed system information such as hardware specifications, installed software, network configurations, and running processes. This data is used to assess the value of the infected system and guide target selection. A notable innovation in EtherRAT is its use of 'EtherHiding,' a technique where the malware stores its command-and-control (C2) server addresses within Ethereum blockchain smart contracts. This approach makes the C2 infrastructure highly resilient to takedown attempts, as the blockchain is decentralized and immutable. Communication with the C2 infrastructure employs CDN-like beaconing patterns, which blend with legitimate content delivery network traffic to avoid detection by network monitoring tools. Initial infection vectors include social engineering tactics such as ClickFix and IT support scams delivered via Microsoft Teams, exploiting user trust and collaboration platforms. The malware also includes a language check for CIS region languages and will self-destruct if such languages are detected, indicating a deliberate targeting strategy to avoid certain geographic regions. Indicators of compromise include multiple file hashes, IP addresses, and domain names associated with the malware's infrastructure. Despite the advanced evasion and persistence techniques, no known exploits in the wild have been reported, and the malware was detected in a retail environment, suggesting potential for broader targeting.

Potential Impact

The impact of EtherRAT on organizations worldwide can be significant due to its capabilities for arbitrary command execution, extensive system reconnaissance, and asset theft. By leveraging Ethereum smart contracts for C2 communication, the malware's infrastructure is highly resilient, complicating incident response and takedown efforts. The CDN-like beaconing technique allows it to evade network detection, increasing the likelihood of prolonged undetected presence within networks. Organizations may suffer data breaches, intellectual property theft, and operational disruptions. The use of social engineering via Microsoft Teams and ClickFix scams highlights the risk to organizations relying on collaboration tools and remote support platforms. The malware's ability to self-destruct in certain language environments suggests a focused targeting approach, potentially leaving some regions less affected but increasing risk in others. The stealth and persistence of EtherRAT could lead to long-term espionage campaigns, financial losses, and reputational damage, especially for retail and other sectors targeted by this malware. The lack of known exploits in the wild indicates that detection and mitigation are still feasible but require proactive measures.

Mitigation Recommendations

To mitigate the threat posed by EtherRAT, organizations should implement a multi-layered defense strategy tailored to its unique characteristics. First, enhance monitoring of network traffic for anomalies resembling CDN-like beaconing patterns, focusing on unusual or persistent connections to suspicious domains and IP addresses listed in threat intelligence feeds. Deploy advanced endpoint detection and response (EDR) solutions capable of identifying Node.js-based backdoors and unusual process behaviors, including arbitrary command execution. Implement strict access controls and multi-factor authentication on collaboration platforms like Microsoft Teams to reduce the risk of social engineering attacks. Conduct targeted user awareness training focused on recognizing IT support scams and suspicious links or attachments delivered via collaboration tools. Regularly audit and restrict the execution of scripts and binaries, especially those related to Node.js environments. Employ threat hunting to identify signs of the SYS_INFO module's fingerprinting activities, such as unusual system information queries or process enumeration. Integrate blockchain monitoring tools to detect suspicious interactions with Ethereum smart contracts that may indicate EtherHiding activity. Finally, maintain updated threat intelligence feeds and share indicators of compromise (IOCs) with security teams to enable rapid detection and response. Incident response plans should include procedures for isolating infected systems and eradicating persistent backdoors leveraging decentralized C2 infrastructures.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.esentire.com/blog/etherrat-sys-info-module-c2-on-ethereum-etherhiding-target-selection-cdn-like-beacons"]
Adversary
North Korean APT group
Pulse Id
69c5a04382b357bdc81343b4
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash03c4e54cc775ab819752dc5d420ab2fed03bd445c3ce398d021031100b334fb4
hash294c597c89023093e1e175949f5104f887b89cd8e1cf1d3192ee9032739f259e
hash2edf1ab615b489e228a89c617d24f66d1e780a6d5e30f6886608dfe79325acf8
hash47f74749cfcd55c8dacde2cc9b4c45282bec7a93ee19b7b81b452c99758d3370
hash5623f4f8942872b2b7cb6d2674c126a42bdf6ed5d1f37c1afc348529e4697d73
hash7dd1bf7a58774a081062f5c8f183d24f95c433805e0bf73280c0adba1c71390d
hash83b1f11c6a0bd267e415136440559131d2d4ace9a65dc221ea3b144fe0e7199b
hashb1ee812e7c786c8696f913595658e57706d97a66ca7b7634f421f5c552e7002b

Ip

ValueDescriptionCopy
ip185.218.19.162

Domain

ValueDescriptionCopy
domainaurineuroth.com
domaineuclidrent.com
domainhayesmed.com
domainjariosos.com
domainjusttalken.com
domainmebeliotmasiv.com
domaino-parana.com
domainpalshona.com
domainregancontrols.com
domainsalinasrent.com
domainshepherdsestates.uk
domainrpc.payload.de
domainwww-flow-submission-management.shepherdsestates.uk

Threat ID: 69c5a8cd3c064ed76fd1d915

Added to database: 3/26/2026, 9:44:45 PM

Last enriched: 3/26/2026, 10:00:53 PM

Last updated: 3/27/2026, 5:15:55 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses