North Korean hackers assault EU targets with Konni RAT malware

0
1

40e3

40e3

40e3

40e3 Risk analysts have uncovered a 40e3 brand new marketing campaign attributed 40e3 to APT37, a North Korean 40e3 group of hackers, concentrating on 40e3 high-value organizations within the Czech 40e3 Republic, Poland, and different European 40e3 nations.

40e3

40e3 On this marketing campaign, the 40e3 hackers use malware referred to 40e3 as Konni, a distant entry 40e3 trojan (RAT) able to establishing 40e3 persistence and performing privilege escalation 40e3 on the host.

40e3

40e3 Konni has been related to 40e3 North Korean cyberattacks since 2014, 40e3 and most lately, it was 40e3 seen in a spear-phishing marketing 40e3 campaign concentrating on the  40e3 Russian Ministry of International Affairs 40e3 .

40e3

40e3 The most recent and nonetheless 40e3 ongoing marketing campaign was noticed 40e3 and analyzed by researchers at  40e3 Securonix 40e3 , who name it STIFF#BIZON, 40e3 and resembles ways and strategies 40e3 that match the operational sophistication 40e3 of an APT (superior persistent 40e3 risk).

40e3

40e3 The STIFF#BIZON marketing campaign

40e3

40e3 The assault begins with the 40e3 arrival of a phishing electronic 40e3 mail with an archive attachment 40e3 containing a Phrase doc (missile.docx) 40e3 and a Home windows Shortcut 40e3 file (_weapons.doc.lnk.lnk).

40e3

40e3 When the LNK file is 40e3 opened, code runs to discover 40e3 a base64-encoded PowerShell script within 40e3 the DOCX file to ascertain 40e3 C2 communication and obtain two 40e3 further information, ‘weapons.doc’ and ‘wp.vbs’.

40e3

40e3  

40e3

40e3

Malicious shortcut file
40e3 Properties of the malicious shortcut 40e3 file

40e3

40e3 The downloaded doc is a 40e3 decoy, supposedly a report from 40e3 Olga Bozheva, a Russian conflict 40e3 correspondent. On the identical time, 40e3 the VBS file runs silently 40e3 within the background to create 40e3 a scheduled process on the 40e3 host.

40e3

40e3

Base64-encoded PowerShell used in the campaign
40e3 Base64-encoded PowerShell provides scheduled process 40e3 40e3 (Securonix)

40e3

40e3 At this part of the 40e3 assault, the actor has already 40e3 loaded the RAT and established 40e3 an information alternate hyperlink, and 40e3 is able to performing the 40e3 next actions:

40e3

  • 40e3 Seize screenshots utilizing the Win32 40e3 GDI API and exfiltrate them 40e3 in GZIP kind.
  • 40e3

  • 40e3 Extract state keys saved within 40e3 the Native State file for 40e3 cookie database decryption, helpful in 40e3 MFA bypassing.
  • 40e3

  • 40e3 Extract saved credentials from the 40e3 sufferer’s net browsers.
  • 40e3

  • 40e3 Launch a distant interactive shell 40e3 that may execute instructions each 40e3 10 seconds.
  • 40e3

40e3 Within the fourth stage of 40e3 the assault, as proven within 40e3 the diagram under, the hackers 40e3 obtain further information that assist 40e3 the operate of the modified 40e3 Konni pattern, fetching them as 40e3 compressed “.cab” archives.

40e3

40e3

Infection chain diagram
40e3 An infection chain diagram 40e3 40e3 (Securonix)

40e3

40e3 These embrace DLLs that exchange 40e3 legit Home windows service libraries 40e3 just like the “wpcsvc” in 40e3 System32, which is leveraged for 40e3 executing instructions within the OS 40e3 with increased person privileges.

40e3

40e3 Doable hyperlinks to APT28

40e3

40e3 Whereas the ways and toolset 40e3 level to APT37, Securonix underscores 40e3 the potential of APT28 (aka 40e3 FancyBear) being behind the STIFF#BIZON 40e3 marketing campaign.

40e3

40e3 “There appears to be a 40e3 direct correlation between IP addresses, 40e3 internet hosting supplier, and hostnames 40e3 between this assault and historic 40e3 information we’ve beforehand seen from 40e3 FancyBear/APT28,” concludes the report.

40e3

40e3 State-sponsored risk teams usually try 40e3 and mimic the TTPs of 40e3 different skillful APTs to obscure 40e3 their hint and mislead risk 40e3 analysts, so the probabilities of 40e3 misattribution, on this case, are 40e3 important.

40e3

40e3

LEAVE A REPLY

Please enter your comment!
Please enter your name here