Home / Industry

More Signs of the more_eggs Backdoor Found in the DNS

Using resumes to fake job applications is not a novel social engineering lure for run-of-the-mill phishing campaigns. But utilizing the same tactic to launch a targeted attack isn’t that common.

The threat actor known as “TA4557,” who has been active since 2018, recently made waves with the lure, however, aided by the backdoor that has been dubbed “more_eggs.” How does it work? In short, the malware is delivered via resumes. The threat actor asks recipients to click a link to the applicant’s personal website, jumpstarting the infection until the final payload—credential theft—is achieved.

The DFIR Report identified 14 domain names and three IP addresses as more_eggs indicators of compromise (IoCs). The WhoisXML API research team expanded this list and uncovered connected artifacts, namely:

  • 35 email-connected domains
  • 11 additional IP addresses, three of which turned out to be malicious
  • 700 IP-connected domains, 131 of which turned out to be malicious
  • 22 string-connected domains

A sample of the additional artifacts obtained from our analysis is available for download from our website.

More Information on the more_eggs IoCs

First off, we sought to find more information on the 17 IoCs that have already been identified beginning with a bulk WHOIS lookup for the 14 domains tagged as IoCs. The results revealed that:

  • They were administered by three registrars led by GoDaddy with 11 domains. Wild West Domains took the second spot with two domains, while GMO Internet administered the last remaining domain.
  • They were created between 1997 and 2024, possibly inferring TA4557’s penchant for older domains. Specifically, three domains were created in 2021, while one each was created in 1997, 1999, 2003, 2008, 2010, 2012, 2016, 2018, 2019, 2020, and 2024.

  • While a huge chunk, 13 domains to be exact, were registered in the U.S., the remaining domain did not have current registrant country data.

We also queried the 14 domains tagged as IoCs on DNS Chronicle API and found that they have had 871 IP resolutions over time. The first resolution dates ranged from 7 October 2019 and 19 March 2024. Take a look at five examples below.

DOMAIN IoCFIRST RESOLUTION DATELAST RESOLUTION DATENUMBER OF IP RESOLUTIONS
annetterawlings[.]com10/18/1910/2/2437
howasit[.]com11/8/191/30/2435
johnshimkus[.]com10/10/1912/30/2266
markqualman[.]com11/19/2111/27/2474
shehasgone[.]com3/19/2410/18/246

Next, we queried the three IP addresses tagged as IoCs on Bulk IP Geolocation Lookup and found that:

  • All three were geolocated in the U.S.
  • They were administered by two ISPs led by Shock Hosting with two IP addresses. Hostwinds managed the remaining IP address.

We also queried the three IP addresses tagged as IoCs on DNS Chronicle API and found that they have had 460 domain resolutions over time. The first resolution dates ranged from 4 October 2019 to 17 November 2020. The IP address IoC 172[.]96[.]139[.]82, for instance, first resolved tx[.]cyrex[.]io on 17 November 2020.

More DNS Connections for more_eggs

Our search for more_eggs-connected artifacts started with a WHOIS History API query for the 14 domains tagged as IoCs. The results showed that 13 of them had 40 email addresses in their historical WHOIS records after duplicates were filtered out. 19 of the 40 email addresses turned out to be public.

A Reverse WHOIS API query for the 19 public email addresses revealed that four appeared in the current WHOIS records of 35 email-connected domains after filtering out duplicates and the domain IoCs.

Next, we queried the 14 domains tagged as IoCs on DNS Lookup API and found that 13 of them resolved to 11 IP addresses after removing duplicates that are not found on the original IoC list.

A Threat Intelligence API query for the 11 additional IP addresses revealed that three of them have already figured in malicious campaigns. The IP address 199[.]59[.]243[.]227, for instance, has seemingly been involved in phishing, command and control (C&C), generic threats, malware distribution, attacks, and suspicious activities.

This post only contains a snapshot of the full research. Download the complete findings and a sample of the additional artifacts on our website or contact us to discuss your intelligence needs for threat detection and response or other cybersecurity use cases.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

NORDVPN DISCOUNT - CircleID x NordVPN
Get NordVPN  [74% +3 extra months, from $2.99/month]
By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign