North Korea Hacking Group Konni Malware – External Evaluation Committee Appointment Notice for Virtual Assets.hwp(2025.5.2)

North Korea Hacking Group Konni Malware – External Evaluation Committee Appointment Notice for Virtual Assets.hwp(2025.5.2)

This analysis details a North Korean cyberattack using a malicious HWP document disguised as a cryptocurrency-related external evaluation committee appointment notice. The malware employs PowerShell commands to execute payloads, evade detection, and exfiltrate data to a remote server. #Kimsuky #Lazarus #Konni #SeacuraMalware

Keypoints

  • The malware disguises itself as a document named โ€œCryptocurrency-related External Evaluation Committee Appointment Notice.hwpโ€ and is linked as a .lnk file with identified MD5, SHA-1, and SHA-256 hashes.
  • It uses obfuscated PowerShell scripts to search for and execute โ€œrshell.exeโ€ within the PowerShell directory as part of its operation.
  • The malware extracts and decodes encrypted data from specific offsets inside the .lnk file using XOR keys and saves the results as executable PE files.
  • The payload setup includes functions to locate specific directories such as โ€œC:UsersPublicDocumentsโ€ for saving malicious files and to decompress embedded .cab files using the โ€˜expandโ€™ command.
  • Batch scripts involved download additional malicious payloads from hxxps://www.seacura.com and execute them, then conduct cleanup by deleting downloaded archives to evade detection.
  • A separate script collects system and user file listings and uploads encrypted data to a controlled server, combining computer names to identify infected machines.
  • All steps are designed to remove traces, evade security tools, and facilitate data theft, reflecting tactics commonly associated with North Korean threat actors.

MITRE Techniques

  • [T1059.001] PowerShell โ€“ The malware uses PowerShell scripts to execute commands, decrypt embedded data, and automate payload deployment. (โ€˜Powershell๋ฅผ ์•…์šฉํ•ด์„œ ํ•ด๋‹น ์•…์„ฑ์ฝ”๋“œ๊ฐ€ ๋™์ž‘ํ•˜๋ฉด ๋ฏธ๋ผ ํŒŒ์ผ์€ HWP ๋กœ ๋งŒ๋“ค์–ด ๋†“์€ ๊ฒƒ์„ ํ™•์ธํ•  ์ˆ˜ ์žˆ๋‹คโ€™ โ€œโ€ฆusing PowerShell to operate the malware and display a decoy HWP fileโ€)
  • [T1105] Ingress Tool Transfer โ€“ Downloads additional payloads from a remote URL using batch scripts. (โ€˜ํŠน์ • URL์—์„œ ํŽ˜์ด๋กœ๋“œ ๋‹ค์šด๋กœ๋“œโ€™, โ€œDownload payload from specific URLโ€)
  • [T1070.004] File Deletion โ€“ Deletes downloaded archives and other files after use to avoid detection. (โ€˜์•…์„ฑ์ฝ”๋“œ๋ฅผ ์‹คํ–‰ํ•˜๋ฉด ํ”์  ์ œ๊ฑฐ ๋ฐ ํƒ์ง€ ํšŒํ”ผ ์œ„ํ•ด ํŠน์ • ํŒŒ์ผ ๊ฐ•์ œ ์‚ญ์ œโ€™, โ€œForcibly deletes specific files to remove traces and evade detectionโ€)
  • [T1036.005] Masquerading โ€“ The initial malicious file masquerades as a legitimate .hwp document related to cryptocurrency evaluation committee notification. (โ€˜๊ฐ€์ƒ์ž์‚ฐ ๊ด€๋ จ ์™ธ๋ถ€ํ‰๊ฐ€์œ„์› ์œ„์ด‰ ์•ˆ๋‚ด๋กœ ์œ„์žฅํ•˜๋Š” ๊ฒƒโ€™, โ€œDisguised as cryptocurrency-related external evaluation committee appointment noticeโ€)
  • [T1041] Exfiltration Over C2 Channel โ€“ Encrypted system and user data files are uploaded to a remote server via HTTP POST requests. (โ€˜ํŒŒ์ผ ์—…๋กœ๋“œ์šฉ ์Šคํฌ๋ฆฝํŠธ ์ด์šฉํ•ด ๋ชจ๋“  ์ •๋ณด ํŒŒ์ผ์„ ์™ธ๋ถ€ ์„œ๋ฒ„๋กœ ์—…๋กœ๋“œโ€™, โ€œUploads all information files to external server using upload scriptโ€)
  • [T1140] Deobfuscate/Decode Files or Information โ€“ Uses XOR decryption with specific keys to decode payload data. (โ€˜XOR ํ‚ค๋กœ ์•”ํ˜ธํ™”๋œ ๋ฐ์ดํ„ฐ๋ฅผ ๋ณตํ˜ธํ™”โ€™, โ€œDecrypts data encrypted with XOR keysโ€)

Indicators of Compromise

  • [File Hashes] Malicious HWP LNK file hashes โ€“ MD5: cbd734874b44e73ce155998db7e6663a, SHA-1: eb4e370782f214d376c6041a06140868ba5f432d, SHA-256: f9f3b762ed1719bf141c38f8c4f21d76cd65c5ac6c62a4b94ce68569ce87178c
  • [Domains] Command and control server โ€“ www.seacura.com used as the remote URL for downloading and uploading payload and stolen data
  • [File Names] Key malware components and scripts: ๊ฐ€์ƒ์ž์‚ฐ ๊ด€๋ จ ์™ธ๋ถ€ํ‰๊ฐ€์œ„์› ์œ„์ด‰ ์•ˆ๋‚ด.hwp.lnk, 36026239.bat, 43183065.bat, 78126406.bat, 82221413.bat, di3726.zip


Read more: http://wezard4u.tistory.com/429498