
Severity
High
Analysis Summary
APT37, also known as Reaper or Group123, is an advanced persistent threat group believed to be based in North Korea. One of the tools that APT37 has been associated with is the Goldbackdoor, also known as RokRAT.
Goldbackdoor is a type of remote access trojan (RAT) that is used to gain unauthorized access to a targeted computer system. Once installed, the RAT allows the attacker to control the system, steal data, and execute commands remotely. The Goldbackdoor RAT is highly sophisticated and uses a number of advanced techniques to avoid detection, including anti-analysis and anti-debugging techniques.
APT37 has been linked to a number of high-profile attacks using Goldbackdoor, including attacks against South Korean targets. The group has also been linked to attacks against targets in Japan, Vietnam, and the Middle East.
The APT37 group is known for its advanced cyber capabilities and its ability to carry out sophisticated attacks with a high degree of stealth and persistence. As such, the group represents a significant threat to global cybersecurity and is closely monitored by law enforcement and intelligence agencies around the world.
Impact
- Information Theft and Espionage
Indicators of Compromise
MD5
- 487769a19f032e981f33023b2cb7fe10
- 74e3d84492845067a0da6cfa00c064eb
SHA-256
- df89db0ec339a5e5109ecced0199c371a859aa0c721275e7556a2f34b33d7b01
- f17ade8c0251c018ab291aa79c9837799ce654418088466933d45cd216fa8948
SHA-1
- 6919dab68dddfeae1d7a247d9938b9aee0846268
- 4cab47f6624b46269585517f80705dda2455cf36
Remediation
- Block all threat indicators at your respective controls.
- Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls
- Do not download documents attached in emails from unknown sources and strictly refrain from enabling macros when the source isn’t reliable.
- Enable antivirus and anti-malware software and update signature definitions in a timely manner. Using multi-layered protection is necessary to secure vulnerable assets
- Along with network and system hardening, code hardening should be implemented within the organization so that their websites and software are secure. Use testing tools to detect any vulnerabilities in the deployed codes.