Rewterz
Rewterz Threat Alert – Donot APT Group – Active IOCs
June 22, 2022
Rewterz
Rewterz Threat Alert – BumbleBee Malware – Active IOCs
June 22, 2022

Rewterz Threat Alert – KONNI APT Group – Active IOCs

Severity

High

Analysis Summary

Konni’s APT Group continues to attack malicious documents written in Russian. Konni’s APT Group conducts attacks with Russian-North Korean trade and economic investment documents.

The vector used for the attack is probably the Spear Phishing method and has been reported in Korea.

The malicious file suspected of being used as an attachment has the name congratulation.zip.

On December 20th messages made to contaminate the Russian consulate situated in Indonesia have been distinguished; these messages involved the New Year Eve 2022 merriment as imitation topic. In spite of its past activities, the North Korean APT gathering this time didn’t involve vindictive records as connections; all things being equal, they joined a .compress record type named “congratulation.zip”, which implies “praise” in Russian, containing an installed executable addressing the primary phase of the disease. The messages were spoofed utilizing a *@mid.ru account as a source to imagine that it was sent from the Russian Embassy in Serbia.

Impact

  • Information Theft and Espionage

Indicators of Compromise

MD5

  • 66fba06e965f9a6ea192db7f452ea9b6

SHA-256

  • 552eb01204857771d3faef4caff34062bab0948ca42e5c35d4927cfb5b6d6ec2

SHA-1

  • faabb9362e2c3a0a14f606780f5b9a8dc3a7802d

Remediation

  • Block all threat indicators at your respective controls.
  • Search for IOCs in your environment.
  • Always be suspicious about emails sent by unknown senders.
  • Never click on the link/attachments sent by unknown senders.