• Threat Resources
    • Malware
    • Dark Web
    • Vulnerabilities
    • Phishing/Scam
    • CERT
    • Smishing
    • EndPoint
    • Mobile
    • Networks
    • APT
    • Trend
  • Daily Threats
  • Security Advisory
  • RSS
  • Feedly
  • Language
    • 한국어
    • English
    • 日本語
한국어
English
日本語
RSS
Feedly
APT

APT Group Profiles – Larva-24005

  • Apr 14 2025
APT Group Profiles – Larva-24005

 

 

1)   Introduction

 

During the breach investigation process, the AhnLab SEcurity intelligence Center (ASEC) discovered a new operation related to the Kimsuky group and named it Larva-24005.1 The threat actors exploited the RDP vulnerability to infiltrate the system. They then changed the system configuration by installing the MySpy malware and RDPWrap to create a continuous remote access environment. They also infected the system with a keylogger that records the user’s keyboard inputs.

 

The threat information identified through forensic analysis has been made public by the ATIP. The information includes the following cases: “Kimsuky Threat Actor Group’s Exploitation of BlueKeep Vulnerability to Breach and Leak Information from Korean Systems” [2] and “Larva-24005 Threat Actor Group’s Use of a Korean Server as Their Main C2” [3].

 

2) Targets and Cases

 

These threat actors have been attacking South Korea’s software, energy, and financial industries since October 2023 and have been sending phishing emails to South Korea and Japan. Through the analysis of the infrastructure used in the attacks, it was confirmed that these threat actors have been attacking South Korea, the United States, China, Japan, Germany, Singapore, and other countries such as South Africa, the Netherlands, Mexico, Vietnam, Belgium, the United Kingdom, Canada, Thailand, and Poland since September 2023.

 

3) Attack Method

 

 

 

In some systems, initial access was gained through exploiting the RDP vulnerability (BlueKeep, CVE-2019-0708). While an RDP vulnerability scanner was found in the compromised system, there is no evidence of its actual use. The threat actor also used other means to distribute the malware, such as attaching the same file to emails and exploiting the Microsoft Office Equation Editor vulnerability (CVE-2017-11882)[1].

 

After gaining access to the system, the threat actor used a dropper to install MySpy malware and RDPWrap, and modified the system settings to allow RDP access.

 

In the final stage, the threat actor infected the system with KimaLogger or RandomQuery keyloggers to collect the keys that the user enters.

 

Email logs show that phishing emails were sent to victims in Korea and Japan from some of the systems used in the attack.

 

The Diamond Model of Larva-24005 is as follows:

 

Item

Description

Adversary

Larva-24005

Vulnerability

BlueKeep (CVE-2019-0708)

Techniques

Spear Phishing Email, RDP Access

Victim

South Korean Software Companies, Energy, Finance

Malware and Tools

RDP Wrap, MySpy

Infrastructure

Using r-e.kr and kro.kr Domains

Table 1. Diamond Model

 

 

Main Malware and Tools

 

The following are the main malware used by this threat group. Note that the stages are based on theoretical concepts, not actual operational steps, so there may be some differences from actual attacks.

 

Name

Description

RDPScanner Type A

CLI (Command-Line Interface) RDP vulnerability scanner

RDPScanner Type B

GUI (Graphic User Interface) RDP vulnerability scanner

Downloader

Downloader

Dropper

DroppeR Creates RDPWrap and MySpy Malware

RDPWrap

Remote Control

MySpy

Estimation of System Information Collection

RDPEnabler

Changed RDP-related settings in the system

RDPLoader

RDPWrap Loader

KimaLogger

Keylogger

RandomQuery

Keylogger

Table 2. Key malware and tools

 

1) Infiltration

 

Multiple RDP vulnerability scanning tools for initial access were found. While some of these tools were used in actual attacks, most were found to be stored in infected systems without being used.

 

(1) RDPScanner CLI Type

 

Discovered in the system that was attacked using the RDP (CVE-2019-0708) vulnerability scanning tool, but it has not been confirmed whether this tool was used for the initial access. The Atk.txt and Sea.txt files are required for execution, but these files could not be secured.

 

(2) RDPScanner GUI Type

 

A tool for scanning the RDP vulnerability (CVE-2019-0708) in a graphical user interface (GUI) format. It reads the IP list from a text file and performs the scanning. The scan results are stored in the RDP_result.txt file in the tool’s execution path.

 

The following are the variants developed from 2019 to 2024.

 

 

 


[1] https://asec.ahnlab.com/en/74073/

 

 


[1] https://atip.ahnlab.com/intelligence/view?id=4464854f-8bb1-443f-b93a-971cb94451f4

[2] https://atip.ahnlab.com/intelligence/view?id=cce9edd9-911b-49da-8726-b46b9d5a9cb2

[3] https://atip.ahnlab.com/intelligence/view?id=4464854f-8bb1-443f-b93a-971cb94451f4

 

 

MD5

1177fecd07e3ad608c745c81225e4544
14caab369a364f4dd5f58a7bbca34da6
184a4f3f00ca40d10790270a20019bb4
30bcac6815ba2375bef3daf22ff28698
46cd19c3dac997bfa1a90028a28b5045
URL

http[:]//star7[.]kro[.]kr/login/help/show[.]php?_Dom=991
http[:]//star7[.]kro[.]kr/login/img/show[.]php?uDt=177
http[:]//www[.]sign[.]in[.]mogovernts[.]kro[.]kr/rebin/include[.]php?_sys=7
FQDN

access-apollo-page[.]r-e[.]kr
access-apollo-star7[.]kro[.]kr
access-mogovernts[.]kro[.]kr
apollo-page[.]r-e[.]kr
apollo-star7[.]kro[.]kr

Tags:

BlueKeep CVE-2019-0708 FPSpy JapanesePhishing Kimalogger Kimsuky kro.kr Larva-24005 MySpy Phishing r-e.kr RandomQuery RDP RDPScanner SCAM T1003 T1021.001 T1039 T1056.001 T1059.003 T1070.001 T1070.006 T1070.007 T1133 T1136.001 T1190 T1204 T1546.008 T1560.001 T1564.002 T1567.002 T1569.002 T1583.004 T1588.006 T1595.002 T1596.005
Previous Post

March 2025 Deep Web and Dark Web Trends Report

Next Post

ATIP_March 2025_Threat Trend Report on APT Groups