

Rewterz Threat Update – LockBit Relaunches Ransomware Operation After Restoring Servers on New Infrastructure
February 26, 2024
Rewterz Threat Advisory – ICS: Multiple Siemens Products Vulnerabilities
February 26, 2024
Rewterz Threat Update – LockBit Relaunches Ransomware Operation After Restoring Servers on New Infrastructure
February 26, 2024
Rewterz Threat Advisory – ICS: Multiple Siemens Products Vulnerabilities
February 26, 2024Severity
High
Analysis Summary
The Konni APT (Advanced Persistent Threat) group has been a cyber espionage group since at least 2014. It is believed to be based in North Korea and is known for targeting government agencies and organizations in South Korea and the United States.
The North Korean hacker group distributes Konni RAT via phishing messages or emails. The infection chain begins when the victim accesses a weaponized file. Adversaries employ Konni RAT to gather information from victims, capture screenshots, steal files, and build a remote interactive shell. KONNI has been linked to various alleged North Korean attacks targeting political groups in Russia, East Asia, Europe, and the Middle East. KONNI shares a significant code overlap with the NOKKI malware family. Konni’s APT Group continues to attack malicious documents written in Russian. This threat actor group conducts attacks on Russian-North Korean trade and economic investment documents.
This APT group was detected targeting the Russian diplomatic sector in January 2022, employing a spear phishing theme for New Year’s Eve festivities as bait. When the malicious email attachment is opened and processed, a series of events occur, allowing the actor to install an implant from the Konni RAT family as the final payload.
Impact
- Information Theft and Espionage
Indicators of Compromise
MD5
- 36db685fd4dd778306c985b61f29292c
- 9de46ffec09c07f1e55f94fe4b4b820f
- 406e4f5b327742f64791674f86f79d64
SHA-256
- 552f88c88112956a0c8c5ba26a7e1915b016124dd4ffcfe8e44311c7b406a01f
- b472002c9e0d79c50d5e4018c98da26c3039e72f6223cb026d96539a8562f014
- 57d6577614d98b7af1c11fb457dd55b797ede00430b3e3c7558b2c748c6aea2b
SHA-1
- 5e8bd087de8568103a4c7b043b0b736b83c9d5af
- fa2466e2f5b34fafb8b20c8a18116b97f85bbc15
- 3d41b3363ad2bdf47ebffb26e77dec2eda0e8c5c
URL
- http://molklib.online/dn.php
- http://wimcwpo.online/dn.php
Remediation
- Block all threat indicators at your respective controls.
- Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Do not download documents attached in emails from unknown sources and strictly refrain from enabling macros when the source isn’t reliable.
- Enable antivirus and anti-malware software and update signature definitions on time. Using multi-layered protection is necessary to secure vulnerable assets.
- Along with network and system hardening, code hardening should be implemented within the organization so that their websites and software are secure. Use testing tools to detect any vulnerabilities in the deployed codes.