返回 TI 主页

Background

On December 23, 2025, the renowned document editor EmEditor officially released an announcement stating that between December 19th and 22nd, its official website installation packages were subjected to a supply chain attack. The MSI installation packages were replaced with malicious ones signed with a non-official signature "WALSHAM INVESTMENTS LIMITED":

Qianxin Threat Intelligence Center's RedDrip Team also observed this incident through its private intelligence production process and captured subsequent complete payloads. According to statistics, EmEditor has a considerable user base in China, with many users being developers, operations personnel, and other technical roles handling sensitive data. Considering the subsequent payload is information-stealing malware, a comprehensive assessment indicates this incident poses a large-scale potential threat to related government and enterprise institutions.

The Tianqing "Liuhe" engine is currently capable of intercepting the malicious MSI. We recommend government and enterprise customers deploy the "Liuhe" engine to defend against unknown threats.


Sample Analysis

Information-Stealing Script

The malicious MSI installation package contains an embedded malicious script used to execute subsequent PowerShell commands.

The script first disables logging and defines several C# classes:

It then collects system information and generates an RSA public key for encrypting the stolen data.

Subsequently, it collects information including system version, username, etc., encrypts it, and uploads it to C2: https://emeditorgb.com/take/mg8heP0r/ + uuid

It steals files from Desktop, Documents, and Downloads paths, first collecting filenames within those paths.

The results are encrypted and written to the file sandbox.txt.

It retrieves system information and writes it to system.txt.

It steals VPN configurations, Windows login credentials, browser information including cookies, Login Data, user settings, etc.

Additionally, it steals credentials from the following software, involving Zoho Mail, Evernote, Notion, Discord, Slack, Mattermost, Skype, LiveChat, MSTeams, Zoom, WinSCP, PuTTY, Steam, Telegram, etc.

Captures a screenshot of the current screen:

After collecting all information, it packages the stolen data into a compressed archive named array.bin.

The contents of array.bin after extraction are as follows:

It checks if the current system language is in the following list. If it belongs to one of the following countries (covering former Soviet regions and Iran), execution terminates.


Browser Extension

Ultimately, it installs a browser extension for persistence, named "Google Drive Caching," which is a fully-featured information-stealing malware.

The core logic script is background.js, with the initial C2 being cachingdrive.com

Considering the potential for initial C2 domains to be exposed and blocked, the attackers also designed a set of DGA (Domain Generation Algorithm) logic as a fallback list. It changes seeds weekly using the formula [original seed, year, week number, year*100+week number].

Calculating for the current week containing December 25, 2025, the generated DGA domains are as follows:

[
    "brt461jnbjvm52mw\.biz",
    "1a298k7iqspq52l4r9e\.space",
    "z2ctmmm61dm0c3wfic\.store",
    "afdwtyy38efzk\.app",
    "08qodmaloshm5zrwhww\.xyz",
    "gs9uuz4h0510qhob\.io",
    "973jgnzjgnwupd1nu\.space",
    "daj54smzpklt5kjq\.space",
    "8mfi71rtud8fov5\.org",
    "0xax86xdizce7kg9cpdk\.online"
]

This extension possesses data-stealing modules capable of stealing system information like CPU, GPU, memory, screen resolution, time zone, as well as all browser cookies, history, extension list, bookmark data, etc.

Clipboard hijacking functionality supports replacing addresses for 30+ types of cryptocurrencies.

Keylogging functionality, categorized based on specific web pages:

Facebook advertising account theft functionality:

Remote control logic is as follows:

    case "get_cookies": // Get all cookies
    case "get_history": // Get browsing history
    case "screenshot": // Screenshot
    case "clear_cookies": // Clear cookies
    case "send_notification": // Send notification (social engineering)
    case "read_file": // Read local file
    case "open_url": // Open malicious website
    case "start_proxy": // Start proxy (man-in-the-middle attack)
    case "uninstall": // Self-uninstall
    case "execute_js": // Execute arbitrary JavaScript on page


Summary

Currently, all products based on Qianxin Threat Intelligence Center's threat intelligence data, including the Qianxin Threat Intelligence Platform (TIP), Tianqing, Tianyan Advanced Threat Detection System, Qianxin NGSOC, and Qianxin Situational Awareness Platform, already support precise detection of such attacks.


IOC

Md5:

a27731876e769ff19e225700085967bf

6a4554509ce27efe5c6b8e58431f60d8

C2:

emedjp.com

emeditorde.com

emedorg.com

emeditorjapan.com

emeditorjp.com

cachingdrive.com

147.45.50.54:443

5.101.82.118:443

46.28.70.245:443

DGA Domains::

brt461jnbjvm52mw.biz

1a298k7iqspq52l4r9e.space

z2ctmmm61dm0c3wfic.store

afdwtyy38efzk.app

08qodmaloshm5zrwhww.xyz

gs9uuz4h0510qhob.io

973jgnzjgnwupd1nu.space

daj54smzpklt5kjq.space

8mfi71rtud8fov5.org

0xax86xdizce7kg9cpdk.online

SUPPLY CHAIN EMEDITOR