Analysis of Cyber Espionage Activities Behind APT37 Threat

Summary:

The report analyzes the covert cyber reconnaissance activities of the state-backed APT37 group, which targets South Korean individuals and organizations related to North Korean human rights and security. It highlights the group’s use of malicious shortcut files and the necessity for enhanced endpoint detection and response (EDR) solutions to counteract these threats.

Keypoints:

  • APT37 is a state-sponsored cyber threat group targeting South Korea.
  • Targets include North Korean human rights organizations and experts in related fields.
  • Utilizes malicious shortcut files as a primary attack strategy.
  • Calls for the implementation of EDR solutions to detect and respond to anomalous behaviors.

  • MITRE Techniques

  • Command and Control (T1071): Utilizes multiple command and control domains to maintain communication with compromised systems.
  • Phishing (T1566): Uses spear-phishing emails to deliver malicious payloads disguised as legitimate documents.
  • Credential Dumping (T1003): Collects user credentials from compromised systems.
  • Data Collection (T1119): Gathers sensitive information from the victim’s device.
  • Exploitation of Public-Facing Applications (T1190): Targets vulnerabilities in applications accessible from the internet.

  • ◈ Executive Summary

    • Analysis of the covert cyber reconnaissance activities of the state-backed APT37 group
    • Information collection targeting the IP addresses (location data), web browsers, operating systems of victims
    • Threat actors using malicious shortcut (lnk) files as a primary strategy
    • Need for active implementation of EDR solutions for enhanced endpoint security 

    1. Overview

    The APT37 group, known as a state-backed cyber security threat actor, is leading various cyber espionage activities against South Korea. The primary targets include North Korean human rights organizations, defectors, journalists covering North Korea, and experts and professors in the fields of unification, defense, diplomacy, and national security.

    The ‘Genians Security Center (GSC)’ has published several CTI analysis reports on various APT37 campaign types, including impersonating North Korean human rights organizations, targeting macOS users, vulnerabilities associated with CVE-2022-41128, and an analysis case of RoKRAT.

    The threat actors are very interested in evading detection by major Anti-Virus signature-based systems to successfully penetrate endpoints. GSC has discovered interesting behavioral patterns while monitoring their activities.

    They repeatedly conducted pre-reconnaissance through a prepared threat infrastructure and collected necessary basic information. To adequately respond to these attack tactics, there is a rising trend for the implementation of Endpoint Detection and Response (EDR) systems that can collect and analyze endpoint event flows and broadly analyze and judge previously unknown anomalous behaviors.

    2. Background

    First, let us look at a case discovered last April. The attack was disguised as being sent by a current university professor with a background in a specific public office. The email titled ‘April North Korea Trends’ was designed to include a document named ‘North Korea Trends.docx’ as an attachment. The email was sent from a VPN IP address ‘61.97.243[.]2’.

    'North Korea Trends' document attack case disguised

    [Figure 1] Attack case disguised as ‘North Korea Trends’ document

    The document file displayed on the screen was not directly attached to the email, but was distributed from an address resembling that of a domestic portal site domain, ‘navarar[.]com’. The ‘North Korea Trends.lnk’ file downloaded from this site is a typical type of shortcut malware.

    The shortcut file contains a legitimate document named ‘North Korea Trends.docx’ to deceive the user, along with malicious PowerShell command instructions. The legitimate document actually contains information on North Korea’s trends for the month of April.

    Content of the legitimate document used in the attack[Figure 2] Content of the legitimate document used in the attack

    Analysis of the lnk file reveals that an RoKRAT malicious module encrypted with XOR logic is hidden inside. It also shows the typical pCloud API communication techniques of APT37, containing the string value ‘–wwjaughalvncjwiajs––’.

    Analysis of the RoKRAT malicious module code[Figure 3] Analysis of the RoKRAT malicious module code

    Moreover, it also includes a function to search for and collect various document and smartphone audio file extensions from user devices.

    Screen of the device information collection function[Figure 4] Screen of the device information collection function

    The file extensions targeted for leakage are as follows:

    • .XLS
    • .DOC
    • .PPT
    • .TXT
    • .M4A
    • .AMR
    • .PDF
    • .HWP

    3. Similar malware

    As mentioned earlier, in April, the RoKRAT module was spread through several shortcut (lnk) files.

    Some of the identified main filenames include △설비목록.lnk △동북공정(미국의회조사국(CRS Report).lnk △Gate access roster 2024.lnk △국가정보 아카데미 8기 통합과정 수료증(최종본).lnk, etc.

    Each lnk file hides the RoKRAT module under names like ‘panic.dat’ or ‘viewer.dat’. Calling is conducted through files like ‘price.bat’ (or ‘find.bat’) and ‘para.dat’ (or ‘search.dat’), depending on the variant. Previously, various filenames such as ‘public.dat’, ‘docu1.dat’ were also used.

    Threat flow diagram
    [Figure 4-1] Threat flow diagram

    The threat actor exhibits a tendency to sign up for cloud services using Gmail accounts. Some noted representative email accounts include:

    • tanessha.samuel@gmail.com
    • tianling0315@gmail.com
    • w.sarah0808@gmail.com
    • softpower21cs@gmail.com
    • sandozmessi@gmail.com

    The ‘panic.dat’ file executes the encrypted RoKRAT module through a Shellcode routine.

    Shellcode decoding screen[Figure 4-2] Shellcode decoding screen

    During the main thread execution, RoKRAT commands are used to control the victim’s system and perform various functions based on case conditions.

    For example, the ‘-e’ condition calls the ‘cmd.exe’ command through the ShellExecuteW function, while the ‘-c’ condition collects specific document files and audio file extensions described earlier and exfiltrates them to the C2 server.

    Functions executed based on RoKRAT conditions
    [Figure 4-3] Functions executed based on RoKRAT conditions

    The targeted file extensions for exfiltration remain the same as those described in the background.

    4. Recon Scenario

    About three days after the previously described spear-phishing attack entitled ‘April North Korea Trends’, new reconnaissance activities are undertaken.

    Email used for reconnaissance activities[Figure 5] Email used for reconnaissance activities

    The email subject contains a typo, suggesting a mistake made when writing the attachment name as the subject. The attached ‘North Korea Cyber Terrorism Lecture Materials.pptx’ file is a legitimate document file.

    Interestingly, the email body contains the same sentence that was used in the email distributing the lnk malware.

    Date 2024-04-23 2024-04-26
    Email Subject April North Korea Trends North Korea Cyber Terrorism Lecture Materials.pptx
    Source IP 61.97.243[.]2 [KR] 61.97.243[.]2 [KR]
    Body Comparison (partial) Thank you for reviewing and
    please provide your feedback.

    Sent from my Galaxy

    Sending you the lecture materials I prepared
    Thank you for reviewing and please provide your feedback.

    Sent from my Galaxy

    Attachment Name North Korea Trends.docx North Korea Cyber Terrorism Lecture Materials.pptx
    Attack Strategy Delivering lnk shortcut malware Delivering a legitimate pptx document
    Command and Control (C2) navarar[.]com N/A
    158.247.249[.]129 [KR] N/A

    [Table 1] Email Content Comparison

    Not only the source IP but also the expressions in the email body are identical. The threat actor does not only deliver malware but also sends legitimate content to lower suspicion or induce replies to prepare for follow-up attacks. Such reconnaissance activities can gather peripheral information necessary for initial infiltration.  

    Meanwhile, on September 27, several emails under the title ‘International Symposium on Civilian Abductions by North Korea’ were widely distributed. This email appeared to attach a document named ‘한일납치문제세미나자자료.pdf’. And the email was confirmed to have been sent from the VPN address ‘108.181.50[.]58’.

    Appearance of reconnaissance disguised as seminar materials on the abduction issue[Figure 6] Appearance of reconnaissance disguised as seminar materials on the abduction issue

    However, the email links to a file on a specific server, similar to the case with the ‘April North Korea Trends’ emails. The linked site is ‘filedownloadserve[.]com’, and the Passive DNS history shows that two IPs were used.

    Domain Address IP Address Country Code
    filedownloadserve[.]com 158.247.219[.]10 [KR]
    141.164.60[.]110 [KR]
    kakaofilestorage[.]com 158.247.219[.]10 [KR]
    141.164.62[.]19 [KR]

    [Table 2] C2 server information

    Notably, the email was sent from the ‘108.181.50[.]58’ VPN address, which has been mentioned as a suspected IP address linked to North Korean-related virtual asset threat activities in the ‘UN Security Council Report’ page 567.

    For reference, it can be seen that the same threat actor utilized similar IP ranges in 2023. The following IPs have been important indicators that were actually used in attacks, but their volatile nature should also be considered over the timeline.

    108.181.50[.]58 108.181.52[.]169
    108.181.52[.]229 108.181.52[.]231
    108.181.52[.]234 108.181.52[.]235
    108.181.52[.]236 N/A

    [Table 3] Identified IP ranges in 2023

    Meanwhile, comparing the attachment link addresses discovered in April and September, it can be seen that while the domain address has changed, the communication parameter values follow a similar pattern.

    2024-04-23 (APT37 RoKRAT) 2024-09-27
    North Korea Trends.docx 한일납치문제세미나자자료.pdf
    navarar[.]com/files/
    files?type=(Count)
    &created=(Base64 Email)
    filedownloadserve[.]com/download/
    files?type=(Count)
    &created=(Base64 Email)
    158.247.249[.]129 [KR] 158.247.219[.]10 [KR]

    [Table 4] C2 parameter value comparison

    On September 30, they carried out reconnaissance activities impersonating a journalist or writer from South Korean broadcasting related to North Korea-related current affairs programs. On October 7, they attempted to approach under the guise of a former government official requesting a review of lecture materials. At this time, although they utilized a URL shortening service, the final connecting domain remains the same.

    Reconn activity impersonating unification current affairs program[Figure 7] Reconnaissance activity impersonating unification current affairs program

    On October 12, they employed a reconnaissance method that did not include attachments or links. At that time, the threat actor impersonated an expert working in the field of North Korean human rights and exhibited characteristics reminiscent of a welcome email for new subscribers.

    This time, there are no links or attached files, and they utilize web beacon reconnaissance techniques by inserting “img src” tags into the email body.

    Screen using web beacon reconnaissance technique
    [Figure 8] Screen using web beacon reconnaissance technique

    Web beacons are originally used for user tracking technologies. They serve to check whether the recipient has accessed some content in web pages or emails, usually for pure web traffic statistics or receipt verification.

    The threat actors abuse this functionality to collect initial reconnaissance materials, such as the recipient’s IP (location information) and web browser (OS) information. These materials are used for analysis necessary for the actual infiltration.

    5. Threat Infra Exposure

    The process of soliciting servers used as threat bases or investigating their interiors according to procedures requires considerable time and close cooperation with relevant agencies. However, there are occasional cases where the threat actor has misconfigured server access permissions, leading to internal materials being exposed externally (Opsec Fail).

    This case of reconnaissance server usage also experienced the phenomenon where log records were fully visible externally due to server configuration issues.

    Partial exposure of reconnaissance infrastructure
    [Figure 9] Partial exposure of reconnaissance infrastructure

    Numerous self-tests were conducted around late September, prior to the full reconnaissance operations, during which some IP addresses used by the threat actor were recorded. The same IPs are utilized in sending emails equipped with beacon functionality.

    When exposed to beacon sensors, user IPs and User Agents are collected. The threat actor can choose block functions based on IP addresses, thereby excluding specific IP ranges from reconnaissance targets, which is used to evade analysis and scrutiny.

    Moreover, by delivering legitimate documents linked to Dropbox addresses, they minimize user suspicion. They observe the response of attack targets through reconnaissance activities and gather the basic information necessary for future full-fledged attacks.

    The threat actors use various IDs throughout their reconnaissance activities, with notable ones being the following: they mostly impersonate △former government agency officials, △journalists from news organizations, △writers for broadcasting stations, △North Korea-related media personnel, △program developers, and △experts in North Korean human rights.

    • c039911
    • kirnchi122
    • nkhumans
    • sjwarng3670
    • shjhe777
    • moonjongjo
    • hanzak99
    • l026star1ove
    • sujan2024
    • samuel19920411
    • alchemist880808
    • senior.developer8688
    • hyook.iri
    • dailynk23
    • nknews23
    • komonrodny
    • johnbahu
    • Dante

    6. Conclusion and Response

    The cyber threats posed by state-backed hacking groups are increasingly sophisticated day by day. The APT37 infrastructure for which access records have been confirmed has revealed the intelligent reconnaissance activities of the threat actors.

    Therefore, institutions and companies need to understand the trends of the latest cyber threats and acquire various insights according to the technological attack difficulty.

    Genian EDR products are useful in identifying the fileless intermediate flow in which malware is introduced into endpoints and executed as commands, as seen in this case.

    Screen investigating fileless flow in Genian EDR
    [Figure 10] Screen investigating fileless flow in Genian EDR

    Even if the initial influx was missed by existing antivirus program patterns installed on the endpoint, Genian EDR products can identify the fileless process and the C2 cloud communications as anomalous behavior. Additionally, the malware used in APT attacks can also be protected through patterns stored in Genians IoC, providing double protection.

    Threat event detailed information screen
    [Figure 11] Threat event detailed information screen

    By using conditions such as search filters and classifications, the detailed flow of events can be tracked in a time-series manner. This enables EDR administrators to conveniently review the timing and stepwise process of threats that have penetrated the endpoint and take follow-up actions.

    Investigation of the installation process of malware in compressed file types
    [Figure 12] Investigation of the installation process of malware in compressed file types

    The history of accessing the malicious file ‘North Korea Trends.zip’ via compression utilities can be retrieved. This enables understanding of the initial influx process and implementing follow-up actions.

    7. Indicator of Compromise

    ● MD5
    5f6682ad9da4590cba106e2f1a8cbe26
    7a66738cca9f86f4133415eedcbf8e88
    105ecd9f6585df4e1fe267c2809ee190
    852544f01172b8bae14ec3e4d0b35115
    358122718ba11b3e8bb56340dbe94f51
    acf4085b2fa977fc1350f0ddc2710502
    b85a6b1eb7418aa5da108bc0df824fc0
    e4ddd5cc8b5f4d791f27d676d809f668

    ● C2
    filedownloadserve[.]com
    kakaofilestorage[.]com
    navarar[.]com
    108.181.50[.]58
    158.247.219[.]10
    158.247.249[.]129
    141.164.62[.]19
    141.164.60[.]110
    223.104.236[.]114
    175.214.194[.]61
    61.97.243[.]2

    newsletter-1

    Source: Original Post