Kimsuky has evolved its PebbleDash and AppleSeed malware clusters with new variants, legitimate tooling like VSCode Tunneling and DWAgent, and infrastructure that hides C2 activity across South Korea and beyond. The campaign used spear-phishing, droppers, and post-exploitation tools to maintain persistence, steal information, and expand access while targeting government, defense, medical, and other sectors. #Kimsuky #PebbleDash #AppleSeed #HelloDoor #httpMalice #httpTroy #HappyDoor #DWAgent #VSCode
Keypoints
- Kimsuky refined its campaigns through multiple phases, introducing tactical shifts and new malware variants based on the PebbleDash platform.
- The group used spear-phishing emails, malicious attachments, and sometimes messenger contacts to achieve initial access.
- Droppers in formats such as JSE, SCR, PIF, and EXE delivered PebbleDash and AppleSeed malware families.
- Post-exploitation activity increasingly relied on legitimate tools, including Visual Studio Code Remote Tunneling and DWAgent, to reduce detection.
- Infrastructure frequently used free South Korean hosting, hacked websites, and tunneling services such as Cloudflare Quick Tunnels and Ngrok.
- Targets were concentrated in South Korea, but PebbleDash activity was also observed in Brazil and Germany, with strong interest in defense and government sectors.
- Evidence suggests the PebbleDash and AppleSeed clusters are operated by a common Kimsuky-affiliated actor with overlapping tradecraft and infrastructure.
MITRE Techniques
- [T1566.001 ] Spearphishing Attachment â Initial access was achieved by sending malicious attachments disguised as documents (âdelivering spear-phishing emails containing malicious attachments disguised as documentsâ).
- [T1598 ] Phishing for Information â Targets were also contacted via messengers to lure them into opening malicious content (âthey also contact targets via messengers in some casesâ).
- [T1059.007 ] JavaScript â JSE droppers were used to decode and launch embedded payloads (âJSE droppers contain a minimum of two Base64-encoded blobsâ).
- [T1027 ] Obfuscated Files or Information â Droppers hid payloads with Base64, XOR, dummy data, and encrypted strings (âfully obfuscated using dummy data and encrypted stringsâ).
- [T1204.002 ] Malicious File â Malicious attachments were crafted to look like legitimate documents, installers, and photos (âdisguised as documentsâ, âproduct quotations, job offers, information guidesâ).
- [T1059.001 ] PowerShell â PowerShell was used to decode content and gather system details (âpowershell.exe -windowstyle hidden certutil -decodeâ).
- [T1140 ] Deobfuscate/Decode Files or Information â Base64, RC4, ChaCha20, and XOR were used to decode or decrypt payloads (âBase64-decoded and then decrypted using RC4â).
- [T1105 ] Ingress Tool Transfer â Payloads and tools such as VSCode CLI and DWAgent were downloaded from remote servers (âdownloads a legitimate Visual Studio Code (VSCode) CLI onto the infected deviceâ).
- [T1053.005 ] Scheduled Task â MemLoad created scheduled tasks for persistence (âschtasks /create /tn /tr âregsvr32 /s ââ).
- [T1547.001 ] Registry Run Keys / Startup Folder â Persistence was established by adding values under Run keys (âregistering itself to the HKCUSoftwareMicrosoftWindowsCurrentVersionRun keyâ).
- [T1543.003 ] Windows Service â httpMalice created a service named CacheDB for persistence (âcreating a service named CacheDBâ).
- [T1218.010 ] Regsvr32 â Multiple droppers and implants executed code through regsvr32 (âexecute the malware using regsvr32.exeâ).
- [T1059.003 ] Windows Command Shell â Commands were executed through cmd.exe with redirected output (âexecute the provided command using chcp 65001 > nul & cmd /U /C [command]â).
- [T1106 ] Native API â httpMalice and other implants used Windows-native behaviors and services to run commands and manage persistence (âIf elevated, a service named CacheDB is createdâ).
- [T1021.005 ] Remote Services: VNC â VSCode tunneling and DWAgent enabled remote interactive access to infected hosts (âestablish covert remote access to the victimâs deviceâ).
- [T1090 ] Proxy â Cloudflare Quick Tunnels, VSCode Tunneling, and Ngrok were used to conceal infrastructure (âactively leverage tunneling servicesâ).
- [T1071.001 ] Web Protocols â C2 traffic used HTTP/HTTPS and POST requests (âcommunicates with the C2 server over the HTTP protocolâ).
- [T1005 ] Data from Local System â AppleSeed collected documents, screenshots, keystrokes, and USB drive lists (âgathers sensitive information such as documents, screenshots, keystrokesâ).
- [T1057 ] Process Discovery â The malware collected process and execution context details such as current directory and privilege level (âgathers critical information from the compromised systemâ).
- [T1082 ] System Information Discovery â Host profiling included MAC address, computer name, volume serial number, IP address, and token status (âcollecting device information, such as the MAC address, computer nameâ).
- [T1113 ] Screen Capture â httpMalice captured screenshots and sent them to C2 (âCapture the screenâ).
- [T1041 ] Exfiltration Over C2 Channel â Stolen data and screenshots were sent back through the command channel (âSend the captured screenshotâ).
- [T1102.001 ] Web Service: Web Service â VSCode tunnel URLs were sent to external services and Slack webhooks (âsent to a Slack channel via a WebHookâ).
Indicators of Compromise
- [File hashes ] Malicious droppers and implants â 995a0a49ae4b244928b3f67e2bfd7a6e, 52f1ff082e981cbdfd1f045c6021c63f, and other hashes including 08160acf08fccecde7b34090db18b32194faed9af49c98a89c8acc55e97276c9
- [File names ] Lure and dropper filenames â security_20260126.scr, ë ¸íě ë.pdf.jse, and xipbkmaw.exe
- [Domains ] C2 and tunneling infrastructure â female-disorder-beta-metropolitan.trycloudflare[.]com, file.bigcloud.n-e[.]kr, and opedromos1.r-e[.]kr
- [Domains ] Additional C2 endpoints â hxxps://www.yespp.co[.]kr/common/include/code/out[.]php, hxxp://newjo-imd[.]com/common/include/library/default.php, and hxxps://www.pyrotech.co[.]kr/common/include/tech/default.php
- [Files ] Payloads and staging artifacts â c:programdataconfig.db, jhsakqvv.dat, and 1.zip
- [Registry keys ] Persistence locations â HKCUSoftwareMicrosoftWindowsCurrentVersionRun, HKCUSoftwareMicrosoftWindowsCurrentVersionRunvalue names like tdll and Everything 1.9a-[filesize]
- [Certificates ] Stolen legitimate certificates were used to evade detection â South Korean organization certificates were referenced as reused signing material
Read more: https://securelist.com/kimsuky-appleseed-pebbledash-campaigns/119785/