Malware Disguised as Normal Installation File of a Korean Development Company – EDR Detection

Malware Disguised as Normal Installation File of a Korean Development Company – EDR Detection

AhnLab Security Emergency response Center (ASEC) has previously covered the malware that is generated by the installation file of a Korean program development company.

Sliver C2 Being Distributed Through Korean Program Development Company

When malware is distributed alongside an installation file, users will struggle to notice that malware is being executed concurrently. Additionally, due to its characteristic of operating in a fileless format by being injected into a normal program, signature-based anti-malware products find it difficult to detect such malware.

However, Endpoint Detection & Response (EDR), which records and reports all suspicious behaviors occurring on endpoints, can keep up with the evolving evasion techniques of such malware. By detecting suspicious behaviors, like the ones listed below, security admins can be alerted to these techniques.

The threat actor downloaded additional malware and used the normal process Powershell.exe to carry out malicious behaviors by performing an injection on the normal program Notepad (notepad.exe).

As shown above, the malware creator carries out a normal installation to make it difficult for users to detect the malware, and they either develop a variant to bypass signature-based detection or carry out their infection through a normal process using a fileless format. However, EDR detects such suspicious behaviors and provides users with a clear flow chart of the threats.

 

MD5

10298c1ddae73915eb904312d2c6007d
1906bf1a2c96e49bd8eba29cf430435f
23f72ee555afcd235c0c8639f282f3c6
27a24461bd082ec60596abbad23e59f2
499f0d42d5e7e121d9a751b3aac2e3f8

To learn more about AhnLab EDR's advanced behavior-based detection and reponse, please click the banner below