Konni’s APT Group continues to attack malicious documents written in Russian. Konni’s APT Group conducts attacks with Russian-North Korean trade and economic investment documents.
The vector used for the attack is probably the Spear Phishing method, and has been reported in Korea.
The malicious file suspected of being used as an attachment has the name Russia-North Korea-South Korea-Trade and Economic Relations-Investment.doc
The malicious DOC document file contains the following VBA code. If the [Use Content] button is clicked, the VBA malware included inside is activated. And the contents of the document are printed as follows, which makes the user dazzle like a normal document file. VBA code makes connections with malicious C2 servers contained in the ObjectPool zone. The attacker would communicate with the attacker’s server through a combination of instructions contained in the ObjectPool TextBox1 to TextBox3 data and content. The content of object ‘_1629205277’ is hardcoded to communicate with the C2 server ‘panda2019.eu5 [.] Org’ address as follows: And copy ‘certutil.exe’ normal file to ‘mx.exe’ file name, and use it to decode and execute ‘1.txt’ file.
Exposure of sensitive information
Russia-North Korea-South Korea-Trade and Economic Relations-Investment.doc
Malware Hash (MD5/SHA1/SH256)