Rewterz x IBM – Guard Your Data: Time to be Cloud-Powered
May 24, 2023Rewterz Threat Alert – Lazarus APT Group – Active IOCs
May 25, 2023Rewterz x IBM – Guard Your Data: Time to be Cloud-Powered
May 24, 2023Rewterz Threat Alert – Lazarus APT Group – Active IOCs
May 25, 2023Severity
High
Analysis Summary
APT37, also known as Reaper or Group123, is an advanced persistent threat group believed to be based in North Korea. One of the tools that APT37 has been associated with is the Goldbackdoor, also known as RokRAT.
Goldbackdoor is a type of remote access trojan (RAT) that is used to gain unauthorized access to a targeted computer system. Once installed, the RAT allows the attacker to control the system, steal data, and execute commands remotely. The Goldbackdoor RAT is highly sophisticated and uses a number of advanced techniques to avoid detection, including anti-analysis and anti-debugging techniques. APT37 has been linked to a number of high-profile attacks using Goldbackdoor, including attacks against South Korean targets. The group has also been linked to attacks against targets in Japan, Vietnam, and the Middle East.
The APT37 group is known for its advanced cyber capabilities and its ability to carry out sophisticated attacks with a high degree of stealth and persistence. As such, the group represents a significant threat to global cybersecurity and is closely monitored by law enforcement and intelligence agencies around the world.
Impact
- Information Theft and Espionage
Indicators of Compromise
MD5
- 7095811df4cb1ee4135ce605af7f163f
- 5f9e0afb3503d909984b3b30d038bdc5
- 2cd04d9e11c6e458ec16db1ab810d625
- be32725e676d49eaa11ff51c61f18907
SHA-256
- 4056772ab9ec106046cc2dfbeed71df92d629e5b612f12775f942c0d3255552d
- 7dd84cc7d8271a88063ce1ff1f1abe74c8e5b33301cb957b951161e6fe1b73fc
- 6234ef67435dfcb65bd661b5f3bb0b77b82fe6cdd2109b6dfb9dea1b65a17d5d
- 479894be4c5dec0992ad3c5b21fb1423643996d80d59dcca76386bb325dc811e
SHA-1
- f7bc384f9de0cd44e6601d84ad15a78193a4d098
- 8baf977afc5d5d87eefc3178c76e0a281a15f772
- 2d9b50e28864ae47786b3f6bcb2e7218aed2d7df
- 37ee57a1097bbacbece974653c0ec435ee19b4f3
Remediation
- Block all threat indicators at your respective controls.
- Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls
- Do not download documents attached in emails from unknown sources and strictly refrain from enabling macros when the source isn’t reliable.
- Enable antivirus and anti-malware software and update signature definitions in a timely manner. Using multi-layered protection is necessary to secure vulnerable assets
- Along with network and system hardening, code hardening should be implemented within the organization so that their websites and software are secure. Use testing tools to detect any vulnerabilities in the deployed codes.