Rewterz Threat Alert – Donot APT Group – Active IOCs
June 22, 2022Rewterz Threat Alert – BumbleBee Malware – Active IOCs
June 22, 2022Rewterz Threat Alert – Donot APT Group – Active IOCs
June 22, 2022Rewterz Threat Alert – BumbleBee Malware – Active IOCs
June 22, 2022Severity
High
Analysis Summary
Konni’s APT Group continues to attack malicious documents written in Russian. Konni’s APT Group conducts attacks with Russian-North Korean trade and economic investment documents.
The vector used for the attack is probably the Spear Phishing method and has been reported in Korea.
The malicious file suspected of being used as an attachment has the name congratulation.zip.
On December 20th messages made to contaminate the Russian consulate situated in Indonesia have been distinguished; these messages involved the New Year Eve 2022 merriment as imitation topic. In spite of its past activities, the North Korean APT gathering this time didn’t involve vindictive records as connections; all things being equal, they joined a .compress record type named “congratulation.zip”, which implies “praise” in Russian, containing an installed executable addressing the primary phase of the disease. The messages were spoofed utilizing a *@mid.ru account as a source to imagine that it was sent from the Russian Embassy in Serbia.
Impact
- Information Theft and Espionage
Indicators of Compromise
MD5
- 66fba06e965f9a6ea192db7f452ea9b6
SHA-256
- 552eb01204857771d3faef4caff34062bab0948ca42e5c35d4927cfb5b6d6ec2
SHA-1
- faabb9362e2c3a0a14f606780f5b9a8dc3a7802d
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment.
- Always be suspicious about emails sent by unknown senders.
- Never click on the link/attachments sent by unknown senders.