Rewterz Threat Alert – NJRAT – Active IOCs
July 18, 2023Rewterz Threat Advisory – CVE-2023-2975 – OpenSSL Vulnerability
July 18, 2023Rewterz Threat Alert – NJRAT – Active IOCs
July 18, 2023Rewterz Threat Advisory – CVE-2023-2975 – OpenSSL Vulnerability
July 18, 2023Severity
High
Analysis Summary
APT37, also known as Reaper or Group123, is an advanced persistent threat group believed to be based in North Korea. One of the tools that APT37 has been associated with is the Goldbackdoor, also known as RokRAT. Goldbackdoor is a type of remote access trojan (RAT) that is used to gain unauthorized access to a targeted computer system. Once installed, the RAT allows the attacker to control the system, steal data, and execute commands remotely.
The Goldbackdoor RAT is highly sophisticated and uses a number of advanced techniques to avoid detection, including anti-analysis and anti-debugging techniques. APT37 has been linked to a number of high-profile attacks using Goldbackdoor, including attacks against South Korean targets. The group has also been linked to attacks against targets in Japan, Vietnam, and the Middle East. The APT37 group is known for its advanced cyber capabilities and its ability to carry out sophisticated attacks with a high degree of stealth and persistence. As such, the group represents a significant threat to global cybersecurity and is closely monitored by law enforcement and intelligence agencies around the world.
Impact
- Information Theft and Espionage
Indicators of Compromise
MD5
- aaeb059d62c448cbea4cf96f1bbf9efa
- 150e53a8c852ac5f23f47aceef452542
SHA-256
- 01e7405ddd5545ffb4a57040acc4b6f8b8a5cc328fa8172e1800a1cb49bdf15c
- 012063e0b7b4f7f3ce50574797112f95492772a9b75fc3d0934a91cc60faa240
SHA-1
- a024274664912edef7751f30a88da6ef2854c011
- a6b272f822b6205526ba56eee936afae1e695b0e
Remediation
- Block all threat indicators at your respective controls.
- Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls
- Do not download documents attached in emails from unknown sources and strictly refrain from enabling macros when the source isn’t reliable.
- Enable antivirus and anti-malware software and update signature definitions in a timely manner. Using multi-layered protection is necessary to secure vulnerable assets
- Along with network and system hardening, code hardening should be implemented within the organization so that their websites and software are secure. Use testing tools to detect any vulnerabilities in the deployed codes.