Threat Trend Report on APT Attacks – August 2024 Major Issues on APT Attacks in South Korea
This report covers classification and statistics on APT domestic attacks confirmed during the month of August 2024 and introduces the functions of each type. Below is a summary of some of the information.
[Table of Contents]
- Overview
- Trends of APT Attacks in Korea
- Spear Phishing
- Attacks Using LNK Files
- Attacks Using HWP Files
- Attacks Using JSE Files
- Attacks Using CHM
- Attacks Using MSC
- Attacks Using EXE Files
- Attacks Suspected of Using Scripts
- Spear Phishing
- AhnLab Response Overview
- Conclusion
- IoC (Indicators of Compromise)
- Key File Names
- File Hashes (MD5s)
- Relevant Domains, URLs, and IP Addresses
[Overview]
AhnLab has been using AhnLab Smart Defense (ASD) to monitor advanced persistent threat (APT) attacks against targets in South Korea. This report will cover the types and statistics of APT attacks in Korea during August 2024 as well as features for each type.

Figure 1. August 2024 statistics on APT attacks in Korea
APT attacks against Korean targets have been categorized by type with most of them found to be spear phishing attacks. In August 2024, spear phishing attacks using HWP and MSC files made up most of the attack types.
[Trends of APT Attacks in Korea]
The cases and features of each APT attack type identified in August 2024 are as follows.
1) Spear Phishing
Spear phishing is a type of phishing attack against specific individuals or groups. Unlike ordinary phishing attacks, the threat actor conducts reconnaissance before launching the attacks to collect information on and learn about the attack targets. Because the threat actor crafts phishing emails using the collected information, the recipients of the emails are highly likely to believe that they are from a trusted source. There are also cases where the sender’s address is manipulated through email spoofing. Most spear phishing attacks include malicious attachments or links that are intended to lure the user to open them.
Types distributed using this technique are as follows.
1.1 LNK를 활용한 공격
Type A
This type executes RAT malware strains. They are generally distributed as compressed files alongside legitimate files. The LNK files found in distribution contained malicious PowerShell commands. Besides downloading malware using DropBox API or Google Drive, recently identified LNK files create an additional script file and obfuscated RAT malware in the TEMP or PUBLIC folder upon execution. The RAT malware executed in the end can perform various malicious behaviors, such as keylogging and taking screenshots, according to commands from the threat actor. XenoRAT and RoKRAT were some of the RAT types found in this case.
The confirmed file name is as follows.
|
File Name |
|
Western Disturbance in the Shinmi Year.lnk |
Table 1. Confirmed file name
Type Unknown
While this type was distributed via spear phishing, it is not included in the aforementioned types.
The confirmed file names are as follows.
|
File Name |
|
S**** Chemical.Inc_Estimate_240811_1-1400.docx.lnk |
|
[D****] Dismissal Certificate Complimentary Document.docx.lnk |
|
2024_2 Gwanak Union Lecture Plan 0810.lnk |
|
Balu Travel_20240813.docx.lnk |
|
***** Kang Requests.docx.lnk |
|
Balance Sheet Related Document.docx.lnk |
|
Public Waste-to-Energy Related Complimentary Document.docx.lnk |
|
Liberation Day Souvenir (**** Choi) .pdf.lnk |
Table 2. Confirmed file names
1.2 Attacks Using HWP Files
Type B
This type downloads and runs additional malware scripts through a batch file (*.BAT) included in the HWP file. Upon running the HWP file, the malicious batch file within the document is created in the TEMP folder. The threat actor inserts a part that prompts users to click so that the batch file can be executed. When the batch file is run, it accesses an external URL to download and run additional files. It also registers the malware to the Task Scheduler or the run key to maintain persistence. Depending on the downloaded script codes, it can perform various malicious behaviors such as executing command lines.
The confirmed file names are as follows.
|
File Name |
|
[Ministry of Unification Human Rights and Humanitarian Affairs Office] 1.5 Track on Relocating North Korean Defectors and Human Rights Issue (1).hwp |
|
0910-24 Read-Ahead(pw; F15azx@!).hwp |
|
Grieco Kavanagh Passive Supporters.hwp |
|
Lecture Overview (pw13579).hwp |
|
Lecture Request.hwp |
|
Attachment 1.Compensation Request Form.hwp |
|
Rules for Writing Manuscripts.hwp |
Table 3. Confirmed file names
Below is the decoy file that was used to deceive the user into thinking they executed a legitimate file.

Figure 2. Confirmed decoy file