Rewterz Threat Alert – Clop Ransomware – Active IOCs
June 9, 2023Rewterz Threat Alert – North Africa Targeted by a New Custom Backdoor “Stealth Soldier” – Active IOCs
June 9, 2023Rewterz Threat Alert – Clop Ransomware – Active IOCs
June 9, 2023Rewterz Threat Alert – North Africa Targeted by a New Custom Backdoor “Stealth Soldier” – Active IOCs
June 9, 2023Severity
High
Analysis Summary
APT37, also known as Reaper or Group123, is an advanced persistent threat group believed to be based in North Korea. One of the tools that APT37 has been associated with is the Goldbackdoor, also known as RokRAT. Goldbackdoor is a type of remote access trojan (RAT) that is used to gain unauthorized access to a targeted computer system. Once installed, the RAT allows the attacker to control the system, steal data, and execute commands remotely.
The Goldbackdoor RAT is highly sophisticated and uses a number of advanced techniques to avoid detection, including anti-analysis and anti-debugging techniques. APT37 has been linked to a number of high-profile attacks using Goldbackdoor, including attacks against South Korean targets. The group has also been linked to attacks against targets in Japan, Vietnam, and the Middle East. The APT37 group is known for its advanced cyber capabilities and its ability to carry out sophisticated attacks with a high degree of stealth and persistence. As such, the group represents a significant threat to global cybersecurity and is closely monitored by law enforcement and intelligence agencies around the world.
Their recent campaign involves the use of malicious files in the form of .zip and .link files named “Key Data 2023 Quarterly Cambodia Poll Appendix/.zip and Quarterly Cambodia Poll Appendix.pdf.lnk, lnk contains double base64 encoded.
Impact
- Information Theft and Espionage
Indicators of Compromise
MD5
- 72b3765580c8c8588feccf06f98c090b
- fe5520783f715549cc3c4df9deaf89bf
SHA-256
- 0f0952cba356f9528527599edef4afbd329f2a73eb5e17e0568df05ecb16282c
- 6a9019404330dc40ab945ec2006b9ff7e8e1b6773faae44a2c6dafdb810cc55b
SHA-1
- 05ef7419387295e08867f0e130c55753adb6464c
- 1808a204ea62b52df9c67f5c665cf34d38783b54
Remediation
- Block all threat indicators at your respective controls.
- Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls
- Do not download documents attached in emails from unknown sources and strictly refrain from enabling macros when the source isn’t reliable.
- Enable antivirus and anti-malware software and update signature definitions in a timely manner. Using multi-layered protection is necessary to secure vulnerable assets
- Along with network and system hardening, code hardening should be implemented within the organization so that their websites and software are secure. Use testing tools to detect any vulnerabilities in the deployed codes.