Rewterz Threat Alert – Amadey Botnet – Active IOCs
May 29, 2023Rewterz Threat Alert – “Stealc” – An Information Stealer Malware – Active IOCs
May 29, 2023Rewterz Threat Alert – Amadey Botnet – Active IOCs
May 29, 2023Rewterz Threat Alert – “Stealc” – An Information Stealer Malware – Active IOCs
May 29, 2023Severity
High
Analysis Summary
APT37, also known as Reaper or Group123, is an advanced persistent threat group believed to be based in North Korea. One of the tools that APT37 has been associated with is the Goldbackdoor, also known as RokRAT. Goldbackdoor is a type of remote access trojan (RAT) that is used to gain unauthorized access to a targeted computer system. Once installed, the RAT allows the attacker to control the system, steal data, and execute commands remotely.
The Goldbackdoor RAT is highly sophisticated and uses a number of advanced techniques to avoid detection, including anti-analysis and anti-debugging techniques. APT37 has been linked to a number of high-profile attacks using Goldbackdoor, including attacks against South Korean targets. The group has also been linked to attacks against targets in Japan, Vietnam, and the Middle East. The APT37 group is known for its advanced cyber capabilities and its ability to carry out sophisticated attacks with a high degree of stealth and persistence. As such, the group represents a significant threat to global cybersecurity and is closely monitored by law enforcement and intelligence agencies around the world.
Their recent campaign involves the use of malicious files in the form of .zip and .link files named “Key Data 2023 Quarterly Cambodia Poll Appendix/.zip and Quarterly Cambodia Poll Appendix.pdf.lnk, lnk contains double base64 encoded.
Impact
- Information Theft and Espionage
Indicators of Compromise
MD5
- 6a0aa1baee0f621768130d8be822d6f0
- 23d55b0f6a502c7ed3a70d41272b0732
- ea64d820b7ee387d0e811bca0104d9e4
- a573c3a5f504fd22c302fbba6af0ab09
SHA-256
- 913830666dd46e96e5ecbecc71e686e3c78d257ec7f5a0d0a451663251715800
- cfbd704cab3a8edd64f8bf89da7e352adf92bd187b3a7e4d0634a2dc764262b5
- af74d416b65217d0b15163e7b3fd5d0702d65f88b260c269c128739e7e7a4c4d
- 7e9f91f0cfe3769df30608a88091ee19bc4cf52e8136157e4e0a5b6530d510ec
SHA-1
- 7cb2c5009dc85fa80697ba4678a8545431ba82ad
- 36a2c2cd63e3ca23a7934cfb3e7a957f2b5363f8
- 6f48f58d80ae41f6b979402696c70db74afc3135
- 49c709788b9d18fa8e55b1ec7bbf114998a30d8c
Remediation
- Block all threat indicators at your respective controls.
- Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls
- Do not download documents attached in emails from unknown sources and strictly refrain from enabling macros when the source isn’t reliable.
- Enable antivirus and anti-malware software and update signature definitions in a timely manner. Using multi-layered protection is necessary to secure vulnerable assets
- Along with network and system hardening, code hardening should be implemented within the organization so that their websites and software are secure. Use testing tools to detect any vulnerabilities in the deployed codes.