EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company
A Chinese APT group compromised a Philippine military company using a new, fileless malware framework called EggStreme. This sophisticated multi-stage toolset achieves persistent, low-profile espionage by injecting malicious code directly into memory and leveraging DLL sideloading. The core component, EggStremeAgent, is a full-featured backdoor enabling extensive system reconnaissance, lateral movement, and data theft via an injected keylogger. The attack begins with EggStremeFuel deploying EggStremeLoader to set up a persistent service, which then executes EggStremeReflectiveLoader to launch EggStremeAgent. The framework's fileless nature and use of legitimate Windows processes make it difficult to detect, posing a significant and persistent threat.
Pulse ID: 68c1d94aeea0cbf6a74fd693
Pulse Link: https://otx.alienvault.com/pulse/68c1d94aeea0cbf6a74fd693
Pulse Author: AlienVault
Created: 2025-09-10 20:02:18
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#BackDoor #Chinese #CyberSecurity #DataTheft #Espionage #InfoSec #KeyLogger #Malware #Military #OTX #OpenThreatExchange #SideLoading #Windows #bot #AlienVault