Summary: This article provides a technical analysis of a new keylogger attributed to the North Korean group Andariel, detailing its capabilities, anti-analysis techniques, and persistence mechanisms. The keylogger logs keystrokes and mouse activity, storing the data in an encrypted archive, and employs various methods to evade detection and analysis.
Threat Actor: Andariel | Andariel
Victim: U.S. Organizations | U.S. Organizations
Key Point :
- The keylogger captures sensitive information by logging keystrokes and mouse activity, utilizing global hooks for interception.
- It employs junk code to obfuscate its functionality and hinder analysis, alongside modifying registry values for persistence.
- The malware creates a password-protected archive for storing logs, which includes timestamps and records of user activity.
- Hybrid Analysis reveals detailed insights into the malware’s behavior, including API calls and indicators of compromise.
- A technical deep dive into the new North Korean keylogger from a Hybrid Analysis perspective
- The keylogger incorporates junk code to hinder analysis and logs keystrokes and mouse activity, storing the data in a password-protected, encrypted archive
- The malware has been associated with a North Korean group targeting U.S. organizations
A Hybrid Analysis Perspective
A Deeper Dive into The Keylogger
Payload Decryption

Persistence
Keylogging Installation
// Keyboard hooking
1. KeyboardHook = SetWindowsHookEx(
WH_KEYBOARD_LL,
HookProcedure,
NULL,
NULL
);
2. MSG Msg;
3. while (GetMessageW(&Msg, NULL, 0, 0) > 0)
- RCX: WH_KEYBOARD_LL (0xD), to monitor low-level keyboard input events
- RDX: the pointer to the hook procedure (described below in “Keylogger Routine”)
- R8: NULL, since the hook routine is within the code associated with the current process
- R9: NULL, to monitor all the existing threads running in the same desktop as the calling thread
Keylogging Routine



Through the Eyes of Hybrid Analysis
Indicators of Compromise
File created
Source: https://hybrid-analysis.blogspot.com/2024/11/recent-keylogger-attributed-to-north.html