EtherRAT & SYS_INFO Module: C2 on Ethereum (EtherHiding), Target Selection, CDN-Like Beacons
EtherRAT is a Node. js-based backdoor malware linked to a North Korean APT group, detected in a retail environment. It enables arbitrary command execution, extensive system information gathering, and asset theft. The malware uses a novel technique called 'EtherHiding' to store its command-and-control (C2) addresses within Ethereum smart contracts, enhancing resilience against takedown efforts. Communication with C2 servers mimics CDN-like beaconing to evade detection by blending with normal network traffic. Initial infection vectors include social engineering via ClickFix and IT support scams conducted over Microsoft Teams. A SYS_INFO module performs detailed host fingerprinting, collecting hardware, software, and network data to select valuable targets. The malware also checks for CIS (Commonwealth of Independent States) languages and self-destructs if detected, indicating a targeted exclusion. This threat poses a medium severity risk due to its stealth, persistence, and data theft capabilities.
AI Analysis
Technical Summary
EtherRAT is a sophisticated backdoor malware implemented in Node.js and attributed to a North Korean advanced persistent threat (APT) group. It was discovered in a retail customer environment and is designed to provide attackers with arbitrary command execution capabilities, enabling them to run any commands on the compromised host. The malware includes a SYS_INFO module that performs comprehensive host fingerprinting, collecting detailed system information such as hardware specifications, installed software, network configurations, and running processes. This data is used to assess the value of the infected system and guide target selection. A notable innovation in EtherRAT is its use of 'EtherHiding,' a technique where the malware stores its command-and-control (C2) server addresses within Ethereum blockchain smart contracts. This approach makes the C2 infrastructure highly resilient to takedown attempts, as the blockchain is decentralized and immutable. Communication with the C2 infrastructure employs CDN-like beaconing patterns, which blend with legitimate content delivery network traffic to avoid detection by network monitoring tools. Initial infection vectors include social engineering tactics such as ClickFix and IT support scams delivered via Microsoft Teams, exploiting user trust and collaboration platforms. The malware also includes a language check for CIS region languages and will self-destruct if such languages are detected, indicating a deliberate targeting strategy to avoid certain geographic regions. Indicators of compromise include multiple file hashes, IP addresses, and domain names associated with the malware's infrastructure. Despite the advanced evasion and persistence techniques, no known exploits in the wild have been reported, and the malware was detected in a retail environment, suggesting potential for broader targeting.
Potential Impact
The impact of EtherRAT on organizations worldwide can be significant due to its capabilities for arbitrary command execution, extensive system reconnaissance, and asset theft. By leveraging Ethereum smart contracts for C2 communication, the malware's infrastructure is highly resilient, complicating incident response and takedown efforts. The CDN-like beaconing technique allows it to evade network detection, increasing the likelihood of prolonged undetected presence within networks. Organizations may suffer data breaches, intellectual property theft, and operational disruptions. The use of social engineering via Microsoft Teams and ClickFix scams highlights the risk to organizations relying on collaboration tools and remote support platforms. The malware's ability to self-destruct in certain language environments suggests a focused targeting approach, potentially leaving some regions less affected but increasing risk in others. The stealth and persistence of EtherRAT could lead to long-term espionage campaigns, financial losses, and reputational damage, especially for retail and other sectors targeted by this malware. The lack of known exploits in the wild indicates that detection and mitigation are still feasible but require proactive measures.
Mitigation Recommendations
To mitigate the threat posed by EtherRAT, organizations should implement a multi-layered defense strategy tailored to its unique characteristics. First, enhance monitoring of network traffic for anomalies resembling CDN-like beaconing patterns, focusing on unusual or persistent connections to suspicious domains and IP addresses listed in threat intelligence feeds. Deploy advanced endpoint detection and response (EDR) solutions capable of identifying Node.js-based backdoors and unusual process behaviors, including arbitrary command execution. Implement strict access controls and multi-factor authentication on collaboration platforms like Microsoft Teams to reduce the risk of social engineering attacks. Conduct targeted user awareness training focused on recognizing IT support scams and suspicious links or attachments delivered via collaboration tools. Regularly audit and restrict the execution of scripts and binaries, especially those related to Node.js environments. Employ threat hunting to identify signs of the SYS_INFO module's fingerprinting activities, such as unusual system information queries or process enumeration. Integrate blockchain monitoring tools to detect suspicious interactions with Ethereum smart contracts that may indicate EtherHiding activity. Finally, maintain updated threat intelligence feeds and share indicators of compromise (IOCs) with security teams to enable rapid detection and response. Incident response plans should include procedures for isolating infected systems and eradicating persistent backdoors leveraging decentralized C2 infrastructures.
Affected Countries
United States, South Korea, Japan, United Kingdom, Germany, Canada, Australia, France, Singapore, Taiwan
Indicators of Compromise
- hash: 03c4e54cc775ab819752dc5d420ab2fed03bd445c3ce398d021031100b334fb4
- hash: 294c597c89023093e1e175949f5104f887b89cd8e1cf1d3192ee9032739f259e
- hash: 2edf1ab615b489e228a89c617d24f66d1e780a6d5e30f6886608dfe79325acf8
- hash: 47f74749cfcd55c8dacde2cc9b4c45282bec7a93ee19b7b81b452c99758d3370
- hash: 5623f4f8942872b2b7cb6d2674c126a42bdf6ed5d1f37c1afc348529e4697d73
- hash: 7dd1bf7a58774a081062f5c8f183d24f95c433805e0bf73280c0adba1c71390d
- hash: 83b1f11c6a0bd267e415136440559131d2d4ace9a65dc221ea3b144fe0e7199b
- hash: b1ee812e7c786c8696f913595658e57706d97a66ca7b7634f421f5c552e7002b
- ip: 185.218.19.162
- domain: aurineuroth.com
- domain: euclidrent.com
- domain: hayesmed.com
- domain: jariosos.com
- domain: justtalken.com
- domain: mebeliotmasiv.com
- domain: o-parana.com
- domain: palshona.com
- domain: regancontrols.com
- domain: salinasrent.com
- domain: shepherdsestates.uk
- domain: rpc.payload.de
- domain: www-flow-submission-management.shepherdsestates.uk
EtherRAT & SYS_INFO Module: C2 on Ethereum (EtherHiding), Target Selection, CDN-Like Beacons
Description
EtherRAT is a Node. js-based backdoor malware linked to a North Korean APT group, detected in a retail environment. It enables arbitrary command execution, extensive system information gathering, and asset theft. The malware uses a novel technique called 'EtherHiding' to store its command-and-control (C2) addresses within Ethereum smart contracts, enhancing resilience against takedown efforts. Communication with C2 servers mimics CDN-like beaconing to evade detection by blending with normal network traffic. Initial infection vectors include social engineering via ClickFix and IT support scams conducted over Microsoft Teams. A SYS_INFO module performs detailed host fingerprinting, collecting hardware, software, and network data to select valuable targets. The malware also checks for CIS (Commonwealth of Independent States) languages and self-destructs if detected, indicating a targeted exclusion. This threat poses a medium severity risk due to its stealth, persistence, and data theft capabilities.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
EtherRAT is a sophisticated backdoor malware implemented in Node.js and attributed to a North Korean advanced persistent threat (APT) group. It was discovered in a retail customer environment and is designed to provide attackers with arbitrary command execution capabilities, enabling them to run any commands on the compromised host. The malware includes a SYS_INFO module that performs comprehensive host fingerprinting, collecting detailed system information such as hardware specifications, installed software, network configurations, and running processes. This data is used to assess the value of the infected system and guide target selection. A notable innovation in EtherRAT is its use of 'EtherHiding,' a technique where the malware stores its command-and-control (C2) server addresses within Ethereum blockchain smart contracts. This approach makes the C2 infrastructure highly resilient to takedown attempts, as the blockchain is decentralized and immutable. Communication with the C2 infrastructure employs CDN-like beaconing patterns, which blend with legitimate content delivery network traffic to avoid detection by network monitoring tools. Initial infection vectors include social engineering tactics such as ClickFix and IT support scams delivered via Microsoft Teams, exploiting user trust and collaboration platforms. The malware also includes a language check for CIS region languages and will self-destruct if such languages are detected, indicating a deliberate targeting strategy to avoid certain geographic regions. Indicators of compromise include multiple file hashes, IP addresses, and domain names associated with the malware's infrastructure. Despite the advanced evasion and persistence techniques, no known exploits in the wild have been reported, and the malware was detected in a retail environment, suggesting potential for broader targeting.
Potential Impact
The impact of EtherRAT on organizations worldwide can be significant due to its capabilities for arbitrary command execution, extensive system reconnaissance, and asset theft. By leveraging Ethereum smart contracts for C2 communication, the malware's infrastructure is highly resilient, complicating incident response and takedown efforts. The CDN-like beaconing technique allows it to evade network detection, increasing the likelihood of prolonged undetected presence within networks. Organizations may suffer data breaches, intellectual property theft, and operational disruptions. The use of social engineering via Microsoft Teams and ClickFix scams highlights the risk to organizations relying on collaboration tools and remote support platforms. The malware's ability to self-destruct in certain language environments suggests a focused targeting approach, potentially leaving some regions less affected but increasing risk in others. The stealth and persistence of EtherRAT could lead to long-term espionage campaigns, financial losses, and reputational damage, especially for retail and other sectors targeted by this malware. The lack of known exploits in the wild indicates that detection and mitigation are still feasible but require proactive measures.
Mitigation Recommendations
To mitigate the threat posed by EtherRAT, organizations should implement a multi-layered defense strategy tailored to its unique characteristics. First, enhance monitoring of network traffic for anomalies resembling CDN-like beaconing patterns, focusing on unusual or persistent connections to suspicious domains and IP addresses listed in threat intelligence feeds. Deploy advanced endpoint detection and response (EDR) solutions capable of identifying Node.js-based backdoors and unusual process behaviors, including arbitrary command execution. Implement strict access controls and multi-factor authentication on collaboration platforms like Microsoft Teams to reduce the risk of social engineering attacks. Conduct targeted user awareness training focused on recognizing IT support scams and suspicious links or attachments delivered via collaboration tools. Regularly audit and restrict the execution of scripts and binaries, especially those related to Node.js environments. Employ threat hunting to identify signs of the SYS_INFO module's fingerprinting activities, such as unusual system information queries or process enumeration. Integrate blockchain monitoring tools to detect suspicious interactions with Ethereum smart contracts that may indicate EtherHiding activity. Finally, maintain updated threat intelligence feeds and share indicators of compromise (IOCs) with security teams to enable rapid detection and response. Incident response plans should include procedures for isolating infected systems and eradicating persistent backdoors leveraging decentralized C2 infrastructures.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.esentire.com/blog/etherrat-sys-info-module-c2-on-ethereum-etherhiding-target-selection-cdn-like-beacons"]
- Adversary
- North Korean APT group
- Pulse Id
- 69c5a04382b357bdc81343b4
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash03c4e54cc775ab819752dc5d420ab2fed03bd445c3ce398d021031100b334fb4 | — | |
hash294c597c89023093e1e175949f5104f887b89cd8e1cf1d3192ee9032739f259e | — | |
hash2edf1ab615b489e228a89c617d24f66d1e780a6d5e30f6886608dfe79325acf8 | — | |
hash47f74749cfcd55c8dacde2cc9b4c45282bec7a93ee19b7b81b452c99758d3370 | — | |
hash5623f4f8942872b2b7cb6d2674c126a42bdf6ed5d1f37c1afc348529e4697d73 | — | |
hash7dd1bf7a58774a081062f5c8f183d24f95c433805e0bf73280c0adba1c71390d | — | |
hash83b1f11c6a0bd267e415136440559131d2d4ace9a65dc221ea3b144fe0e7199b | — | |
hashb1ee812e7c786c8696f913595658e57706d97a66ca7b7634f421f5c552e7002b | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip185.218.19.162 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainaurineuroth.com | — | |
domaineuclidrent.com | — | |
domainhayesmed.com | — | |
domainjariosos.com | — | |
domainjusttalken.com | — | |
domainmebeliotmasiv.com | — | |
domaino-parana.com | — | |
domainpalshona.com | — | |
domainregancontrols.com | — | |
domainsalinasrent.com | — | |
domainshepherdsestates.uk | — | |
domainrpc.payload.de | — | |
domainwww-flow-submission-management.shepherdsestates.uk | — |
Threat ID: 69c5a8cd3c064ed76fd1d915
Added to database: 3/26/2026, 9:44:45 PM
Last enriched: 3/26/2026, 10:00:53 PM
Last updated: 3/27/2026, 5:15:55 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.