SkillAgentSearch skills...

EternalRocks

EternalRocks worm

Install / Use

/learn @stamparm/EternalRocks
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

EternalRocks (a.k.a. MicroBotMassiveNet)

EternalRocks is a network worm (i.e. self-replicating), emerged in first half of May 2017, with oldest known sample fc75410aa8f76154f5ae8fe035b9a13c76f6e132077346101a0d673ed9f3a0dd dating to 2017-05-03. It spreads through public (The Shadow Brokers NSA dump) SMB exploits: ETERNALBLUE, ETERNALCHAMPION, ETERNALROMANCE and ETERNALSYNERGY, along with related programs: DOUBLEPULSAR, ARCHITOUCH and SMBTOUCH.

taskhost.exe properties

First stage malware UpdateInstaller.exe (got through remote exploitation with second stage malware) downloads necessary .NET components (for later stages) TaskScheduler and SharpZLib from Internet, while dropping svchost.exe (e.g. sample) and taskhost.exe (e.g. sample). Component svchost.exe is used for downloading, unpacking and running Tor from archive.torproject.org along with C&C (ubgdgno5eswkhmpy.onion) communication requesting further instructions (e.g. installation of new components).

Second stage malware taskhost.exe (Note: different than one from first stage) (e.g. sample) is being downloaded after a predefined period (24h) from http://ubgdgno5eswkhmpy.onion/updates/download?id=PC and run. After initial run it drops the exploit pack shadowbrokers.zip and unpacks contained directories payloads/, configs/ and bins/. After that, starts a random scan of opened 445 (SMB) ports on Internet, while running contained exploits (inside directory bins/) and pushing the first stage malware through payloads (inside directory payloads/). Also, it expects running Tor process from first stage to get further instructions from C&C.

Update (2017-05-25)

Author ("tmc") suddenly drops the whole campaign after a recent fuzz. C&C page currently holds this moment the following (new) message:

C&C message

After a successful registration, user can find following messages from malware author ("tmc") himself:

Its not ransomware, its not dangerous, it just firewalls 
the smb port and moves on. I wanted to play some games with 
them, considering I had visitors, but the news has to much 
about weaponized doomsday worm eternal rocks payload. much 
thought to be had... ps: nsa exploits were fun, thanks 
shadowbrokers!

Message 1

btw, all I did, was use the NSA tools for what they were 
built, I was figuring out how they work, and next thing I 
knew I had access, so what to do then, I was ehh, I will 
just firewall the port, thank you for playing, have a nice 
a day. 

Message 2

Also, malware doesn't update any more to the (shadowbrokers exploit pack) second stage, but to the dummy executable:

New sample

Host Based indicators

Dropped files

Paths

  • c:\Program Files\Microsoft Updates\SharpZLib.zip # in newer variants

  • c:\Program Files\Microsoft Updates\svchost.exe

  • c:\Program Files\Microsoft Updates\installed.fgh

  • c:\Program Files\Microsoft Updates\ICSharpCode.SharpZipLib.dll # in newer variants

  • c:\Program Files\Microsoft Updates\Microsoft.Win32.TaskScheduler.dll

  • c:\Program Files\Microsoft Updates\SharpZLib\ # in newer variants

  • c:\Program Files\Microsoft Updates\temp\tor.zip

  • c:\Program Files\Microsoft Updates\temp\Tor\

  • c:\Program Files\Microsoft Updates\required.glo

  • c:\Program Files\Microsoft Updates\taskhost.exe

  • c:\Program Files\Microsoft Updates\TaskScheduler.zip

  • c:\Program Files\Microsoft Updates\TaskScheduler\

  • c:\Program Files\Microsoft Updates\torunzip.exe # in older variants

Persistence

  • Two scheduled tasks ServiceHost and TaskHost having multiple triggers

Scheduled tasks

Mutexes

  • {8F6F00C4-B901-45fd-08CF-72FDEFF}

  • {8F6F0AC4-B9A1-45fd-A8CF-72FDEFF}

  • 20b70e57-1c2e-4de9-99e5-69f369006912

Samples

First stage

Second stage

Network indicators

C&C server(s)

  • ubgdgno5eswkhmpy.onion

Example C&C communication

Downloading required .NET components (first stage)

  • http://api.nuget.org/packages/taskscheduler.2.5.23.nupkg
  • http://api.nuget.org/packages/sharpziplib.0.86.0.nupkg # in newer variants

Appendix

Decompilation of an older sample

  • C# source # 1ee894c0b91f3b2f836288c22ebeab44798f222f17c255f557af2260b8c6a32d

Globals

Network traffic capture (PCAP)

Yara rules

Debug strings

  • C:\Program Files (x86)\Microsoft Visual Studio\VB98\VB6.OLB

  • C:\Users\tmc\Documents\DownLoader\Project1.vbp

  • `C:\Users\tmc\Documents\TorUnzip\Project1.

View on GitHub
GitHub Stars469
CategoryDevelopment
Updated9d ago
Forks149

Security Score

80/100

Audited on Mar 20, 2026

No findings