Distribution of Malicious LNK Files Targeting Korean Financial Companies

ASEC has identified the distribution of malicious LNK files targeted at Korean financial companies, delivered via emails containing malicious URLs that trigger a downloadable ZIP with a legitimate PDF and a malicious LNK. The LNK launches an obfuscated PowerShell command to steal user data and download additional malicious payloads.
#LNK #PowerShell #ASEC #KoreanFinancialCompanies #shutss #thevintagegarage #cumasufitness

Keypoints

  • Malicious LNK files are being distributed to Korean financial companies.
  • Distribution occurs through emails with malicious URLs.
  • Downloaded ZIP contains both a legitimate PDF and a malicious LNK file.
  • The LNK file executes an obfuscated PowerShell command.
  • Stolen data includes user information and files, sent to a remote server.
  • Scripts are highly obfuscated/complex to evade detection; RunKeys persistence is used.
  • Users are advised not to open or execute files from unknown sources.

MITRE Techniques

  • [T1566.001] Phishing: Spearphishing Link – The distribution occurs through emails with malicious URLs. Quote: “The recently observed LNK files are believed to be distributed through emails containing a malicious URL.”
  • [T1071.001] Web Protocols – Uses HTTP/S for communication with the command and control server. Quote: “Uses HTTP/S for communication with the command and control server.”
  • [T1059.001] PowerShell – The LNK file executes a malicious PowerShell command. Quote: “The malicious LNK file may easily be mistaken for an Excel file by an average user. However, the LNK file contains a malicious PowerShell command…”
  • [T1027] Obfuscated/Compressed/Encoded Files or Information – The PowerShell command is obfuscated; strings are fragmented to evade detection. Quote: “The PowerShell command is obfuscated, with a higher level of complexity… special characters are used in variable names, and all strings are fragmented to evade analysis and detection.”
  • [T1547.001] Registry Run Keys/Startup Folder – Registers to the RunKey (start.vbs). Quote: “Registers to the RunKey (start.vbs)”.
  • [T1003] Credential Dumping – Collects user information from the system. Quote: “Collects user information from the system.”
  • [T1486] Data Encrypted for Impact – Potentially encrypts user data to extort victims. Quote: “Potentially encrypts user data to extort victims.”
  • [T1070.004] File Deletion – Deletes the LNK and CAB files to erase traces of execution. Quote: “The LNK file and the CAB file are then deleted to erase traces of execution.”
  • [T1041] Exfiltration Over C2 Channel – Stolen information is sent to a remote server. Quote: “Stolen information includes… and is sent to ‘http://shutss.com/upload.php’.”

Indicators of Compromise

  • [MD5] e3eeeebb117b7c3128d87b6e027bd85d
  • [URL] http://shutss.com/list.php?f=%COMPUTERNAME%.txt, http://shutss.com/upload.php, https://cumasufitness.com/wp-includes/js/inc/?aEFrmRUBjZHtF=cfv0wxmIIUr%2BJAwMxATk9fG%2B8bF2B4KmBd7fe3KYw594YW%2B4GMISiUDCi6d3o8rjLWkvIZyD%2BDGFejKC5K%2BM2jACfRH%2Baq6HxTGuHd0ZXc8yANAvFQ3Zduafgo1P2JU%2FBSN1e3uNA6w%3D, https://thevintagegarage.com/plugins/content/src/inc/get.php?ra=iew&zw=lk0100
  • [Domain] shutss.com, cumasufitness.com, thevintagegarage.com
  • [File name] 금융당국 요청에 따른 프로젝트 정보 확인 요청의 건.zip, transfer.cab, 1.bat
  • [File name]_start.vbs_, 37667862.bat, 57089304.bat, 39054408.bat, 69299856.bat, unzip.exe (utility files mentioned in the script chain)

Read more: https://www.hendryadrian.com/distribution-of-malicious-lnk-files-targeting-korean-financial-companies/