TARSIP-ECLIPSE - Possible infection

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The TARSIP-ECLIPSE backdoor communicates with the C2 server over SSL on port 443 even if the TLS option is not set. Once an SSL session
has been established with the server, the malware will make a GET request.
Two distinct TARSIP variants have been observed, TARSIP-MOON, and TARSIP-ECLIPSE. These variant names are based on .pdb artifacts present
in each variant. TARSIP communicates using encoded configuration information hidden in HTTPS headers. It stores 3DES encrypted
configuration information at the end of the file. In order to find the key used to encrypt/decrypt configuration data, as well as the
configuration data length, the malware will search within itself for the byte string 0x1B345E2D203A6635.
ref. http://intelreport.mandiant.com/Mandiant_APT1_Report_Appendix.zip p.92