Malware disguised as a Public document (personal, form) created by Kimsuky

Malware disguised as a Public document (personal, form) created by Kimsuky
This article discusses a malware disguised as a public document created by Kimsuky, specifically a malicious file named 공적 조서(개인,양식).lnk. The malware operates through PowerShell and is designed to extract and execute harmful data. Affected: Kimsuky, malware victims, cybersecurity sector

Keypoints :

  • The malware is a .lnk file that executes PowerShell commands.
  • It searches for files in the C:WindowsSysWow64WindowsPowerShellv1.0 directory.
  • Extracts data from specific offsets in the .lnk file and saves them as .hwpx and executable files.
  • Creates temporary files (elephant.dat, sharke.bat, caption.dat) in the %temp% directory.
  • The malware targets individuals related to North Korea, such as defectors or officials.

MITRE Techniques :

  • T1027 – Obfuscated Files or Information: The malware obfuscates its actions to evade detection.
  • T1059.001 – Command and Scripting Interpreter: PowerShell is used to execute commands and scripts.
  • T1036 – Masquerading: The malware disguises itself as a legitimate public document.
  • T1203 – Exploitation for Client Execution: The malware exploits user actions to execute malicious payloads.

Indicator of Compromise :

  • [file name] 공적조서(개인,양식).lnk
  • [file size] 232,042,783 Bytes
  • [file hash] MD5: 5adfa76b72236bf017f7968fd012e968
  • [file hash] SHA-1: 5f0d09853fb459500237105201bbf33c09da2126
  • [file hash] SHA-256: 7df7ad7b88887a06b559cd453e7b65230d0cccff1a403328a521d8753000c6c
  • Check the article for all found IoCs.

Full Story: https://wezard4u.tistory.com/429386

Views: 0