ASEC has identified the distribution of malicious LNK files targeted at Korean financial companies, delivered via emails containing malicious URLs that trigger a downloadable ZIP with a legitimate PDF and a malicious LNK. The LNK launches an obfuscated PowerShell command to steal user data and download additional malicious payloads.
#LNK #PowerShell #ASEC #KoreanFinancialCompanies #shutss #thevintagegarage #cumasufitness
#LNK #PowerShell #ASEC #KoreanFinancialCompanies #shutss #thevintagegarage #cumasufitness
Keypoints
- Malicious LNK files are being distributed to Korean financial companies.
- Distribution occurs through emails with malicious URLs.
- Downloaded ZIP contains both a legitimate PDF and a malicious LNK file.
- The LNK file executes an obfuscated PowerShell command.
- Stolen data includes user information and files, sent to a remote server.
- Scripts are highly obfuscated/complex to evade detection; RunKeys persistence is used.
- Users are advised not to open or execute files from unknown sources.
MITRE Techniques
- [T1566.001] Phishing: Spearphishing Link – The distribution occurs through emails with malicious URLs. Quote: “The recently observed LNK files are believed to be distributed through emails containing a malicious URL.”
- [T1071.001] Web Protocols – Uses HTTP/S for communication with the command and control server. Quote: “Uses HTTP/S for communication with the command and control server.”
- [T1059.001] PowerShell – The LNK file executes a malicious PowerShell command. Quote: “The malicious LNK file may easily be mistaken for an Excel file by an average user. However, the LNK file contains a malicious PowerShell command…”
- [T1027] Obfuscated/Compressed/Encoded Files or Information – The PowerShell command is obfuscated; strings are fragmented to evade detection. Quote: “The PowerShell command is obfuscated, with a higher level of complexity… special characters are used in variable names, and all strings are fragmented to evade analysis and detection.”
- [T1547.001] Registry Run Keys/Startup Folder – Registers to the RunKey (start.vbs). Quote: “Registers to the RunKey (start.vbs)”.
- [T1003] Credential Dumping – Collects user information from the system. Quote: “Collects user information from the system.”
- [T1486] Data Encrypted for Impact – Potentially encrypts user data to extort victims. Quote: “Potentially encrypts user data to extort victims.”
- [T1070.004] File Deletion – Deletes the LNK and CAB files to erase traces of execution. Quote: “The LNK file and the CAB file are then deleted to erase traces of execution.”
- [T1041] Exfiltration Over C2 Channel – Stolen information is sent to a remote server. Quote: “Stolen information includes… and is sent to ‘http://shutss.com/upload.php’.”
Indicators of Compromise
- [MD5] e3eeeebb117b7c3128d87b6e027bd85d
- [URL] http://shutss.com/list.php?f=%COMPUTERNAME%.txt, http://shutss.com/upload.php, https://cumasufitness.com/wp-includes/js/inc/?aEFrmRUBjZHtF=cfv0wxmIIUr%2BJAwMxATk9fG%2B8bF2B4KmBd7fe3KYw594YW%2B4GMISiUDCi6d3o8rjLWkvIZyD%2BDGFejKC5K%2BM2jACfRH%2Baq6HxTGuHd0ZXc8yANAvFQ3Zduafgo1P2JU%2FBSN1e3uNA6w%3D, https://thevintagegarage.com/plugins/content/src/inc/get.php?ra=iew&zw=lk0100
- [Domain] shutss.com, cumasufitness.com, thevintagegarage.com
- [File name] 금융당국 요청에 따른 프로젝트 정보 확인 요청의 건.zip, transfer.cab, 1.bat
- [File name]_start.vbs_, 37667862.bat, 57089304.bat, 39054408.bat, 69299856.bat, unzip.exe (utility files mentioned in the script chain)