Analysis Report on Malware – Disguised as Cracked Programs Targeting Korean Users

Analysis Report on Malware – Disguised as Cracked Programs Targeting Korean Users

Overview

 

AhnLab SEcurity intelligence Center (ASEC) has discussed cases of Remote Access Trojan (RAT) and bitcoin miner attacks targeting Korean users in our ASEC blog post, “Orcus RAT Being Distributed Disguised as a Hangul Word Processor Crack[1].” Until recently, the attacker has been creating and distributing malware, and more than 20,000 systems have been infected based on our infrastructure. 

Malware is generally distributed disguised as cracked versions of legitimate programs, such as Microsoft Office and Windows license verification tools and the Hangul word processor, infecting many Korean systems. In addition, the attacker updates malware by registering the task scheduler in infected systems. The registered task scheduler executes a PowerShell command to install the malicious code. If the task scheduler is not cured, new malicious code continues to be installed in the system. 

As the current AhnLab V3 products can cure the task scheduler installed by malicious code, the problem of malicious code being installed again does not arise even if the user encounters malicious code disguised as a cracked program. However, in environments that do not use V3, if the user removes the malicious code, the system remains vulnerable to the installation of new malicious code because the task scheduler was not cured. One type of malicious code installed serves as an update function. So, even if the existing address is blocked because PowerShell commands continue to change, the occurrence of infection continues.

 

Malware Analysis

 

1. Attack Flow

 

The attack flow is similar to previous cases. In recent distribution cases, malicious code was disguised as a Microsoft Office crack and distributed through webhard (cloud) or torrent sites. The difference from past cases is the addition of a process to obtain download addresses and the platform where malicious code is uploaded. Also, new malicious code has been confirmed.

 


Figure 1. Attack Flow

 


[1] https://asec.ahnlab.com/en/45462/

MD5

08299a45472f501644b4daa458336428
3a4d761de4fac0c2e47a5c84fca78c0f
3c1e4803d0837d026e9d41e3987346d6
5c39c635b52c595c06f6196790d252a2
6a648b7d0e4ae16f6beb170decd5b0b6
URL

https[:]//cdn[.]discordapp[.]com/attachments/1063589763078160457/1114034420517703720/photo_4021-11-2023_01-04-52
https[:]//cdn[.]discordapp[.]com/attachments/1206915682977976353/1208651774416654396/Office2_[.]mp3?ex=6624a92e&is=6612342e&hm=7815a66c2d1b05260d5d437fdeeeac98bb7e90fa9d52f97aec917be2e805cf07&
https[:]//cdn[.]discordapp[.]com/attachments/1206915682977976353/1208651776526647336/KMS_R[.]mp3?ex=6624a92f&is=6612342f&hm=f1140afece0a444ebc741b1be4bb6c2aba6311a6ba9b6f9b76caa3550f77cef3&
https[:]//cdn[.]discordapp[.]com/attachments/1206915682977976353/1208651776929308732/KMS_R_[.]mp3?ex=6624a92f&is=6612342f&hm=328d040705dd4ae71d868a3e56c4a6d9f0e2729b35041a3585fa4d8c04d928e0&
https[:]//cdn[.]discordapp[.]com/attachments/1206915682977976353/1208651777268908032/Office2[.]mp3?ex=6624a92f&is=6612342f&hm=8a178768e508e9816e3a3e8e313fe9b4571069120ed57ded3402099441c607e4&
FQDN

minecraftrpgserver[.]com