북한 해킹 단체 김수키(Kimsuky)에서 만든 PowerShell 백도어 도구(2024.2.29)
Common Information
Type Value
UUID 2bae8c78-deb8-4b64-8acb-acb8a8da0dac
Fingerprint 7a185f4ea9069a67
Analysis status DONE
Considered CTI value 2
Text language
Published Aug. 1, 2024, 12:58 a.m.
Added to db Aug. 31, 2024, 11:18 a.m.
Last updated Nov. 17, 2024, 6:55 p.m.
Headline 꿈을꾸는 파랑새
Title 북한 해킹 단체 김수키(Kimsuky)에서 만든 PowerShell 백도어 도구(2024.2.29)
Detected Hints/Tags/Attributes 26/1/15
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 478 꿈을꾸는 파랑새 https://wezard4u.tistory.com/feed 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details Domain 339
system.net
Details Domain 1
system.ru
Details Domain 1
trojan.ps
Details Domain 1
backdoor.powershell.agent.eu
Details Domain 1
behaveslike.ps.exploit.nr
Details File 3
client.ps1
Details File 59
csc.exe
Details File 9
trojan.ps
Details File 3
script.bat
Details File 1
behaveslike.ps
Details File 9
악성코드-cz_army_nato_coeration.zip
Details md5 2
c81ed44799aefb540123159618f7507c
Details sha1 2
fd23177a4481f39fe53a306e2d7fe282cb30a87d
Details sha256 2
87b5a1f79a2be17401d8b2d354c61619ce6195b57e8a5183f78b98e233036062
Details Url 1
http://m.net.dns