Rewterz
Rewterz Threat Alert – Mirai Botnet – Active IOCs
September 28, 2022
Rewterz
Rewterz Threat Alert – Ryuk Ransomware – Active IOCs
September 28, 2022

Rewterz Threat Alert – KONNI APT Group – Active IOCs

Severity

High

Analysis Summary

KONNI is a remote access tool that North Korean cyber attackers have been using since at least 2014. The North Korean hacker group distributes Konni RAT via phishing messages or emails. The infection chain begins when the victim accesses a weaponized file. Adversaries employ Konni RAT to gather information from victims, capture screenshots, steal files, and build a remote interactive shell. KONNI has been linked to various alleged North Korean attacks targeting political groups in Russia, East Asia, Europe, and the Middle East. KONNI shares a significant code overlap with the NOKKI malware family. Konni’s APT Group continues to attack malicious documents written in Russian. This threat actor group conducts attacks with Russian-North Korean trade and economic investment documents.

This APT group was detected targeting the Russian diplomatic sector in January 2022, employing a spear phishing theme for New Year’s Eve festivities as a bait. When the malicious email attachment is opened and processed, a series of events occur, allowing the actor to install an implant from the Konni RAT family as the final payload.

The latest campaign includes filename: 카뱅과 손잡은 코인원_비트 독주 체제 무너뜨릴까 [위클리 코인리뷰] – 이코노미스트.docx

Impact

  • Information Theft and Espionage

Indicators of Compromise

MD5

  • 00e6e9ed4666623860686c123ed334f0

SHA-256

  • bf7a8d81315953cada61abcc34ea9241d07f2d44c1e445deb3f74f7fd842879e

SHA-1

  • 8031088ef9d341e725d515d7089feb1069ea0b3a

URL

  • http[:]//word2022[.]c1[.]biz/template[.]dotm

Remediation

  • Block all threat indicators at your respective controls.
  • Search for IOCs in your environment.
  • Always be suspicious about emails sent by unknown senders.
  • Never click on the link/attachments sent by unknown senders.