鲨鱼的狂欢 — APT-C-55 Kimsuky组织近期BabyShark组件披露
Tags
Common Information
Type Value
UUID b9b75d68-26de-46b6-85cd-daf0b1a68750
Fingerprint b3b808f26d9edb0f
Analysis status DONE
Considered CTI value 2
Text language
Published March 12, 2022, midnight
Added to db Jan. 30, 2023, 4:34 p.m.
Last updated Nov. 15, 2024, 12:35 p.m.
Headline 鲨鱼的狂欢 — APT-C-55 Kimsuky组织近期BabyShark组件披露
Title 鲨鱼的狂欢 — APT-C-55 Kimsuky组织近期BabyShark组件披露
Detected Hints/Tags/Attributes 8/0/32
Attributes
Details Type #Events CTI Value
Details Domain 1
1drv.com
Details Domain 4
ielsems.com
Details Domain 6
worldinfocontact.club
Details Domain 3
api.onedrive.com
Details Domain 208
mp.weixin.qq.com
Details Domain 19
www.huntress.com
Details File 3
macro.php
Details File 1
判断如果%appdata%目录下存在dsektop.tmp
Details File 1
最终删除文件dsektop.tmp
Details File 1
club获取desktop.tmp
Details File 1
添加注入表键值appxr1bysyqf6kpaq1aje5sbadka8dgx3g4g写入请求dsektop.tmp
Details File 1
sys.vbs
Details File 1
添加计划任务调用wscript.exe
Details File 1
执行sys.vbs
Details File 1
样本4bb1827e37223b674ab7270f7b7bbb4d与之前披露的babyshark组件的初始阶段载荷version_hwp.dll
Details File 89
version.dll
Details File 1
c:\users\用户名\appdata\roaming\microsoft\创建log.txt
Details File 1
样本4bb1827e37223b674ab7270f7b7bbb4d与之前披露的babyshark初始阶段的载荷version_hwp.dll
Details File 1
且从编译时间来看样本4bb1827e37223b674ab7270f7b7bbb4d为version_hwp.dll
Details md5 1
3b11456f184a0d263b7f56cb92667b0e
Details md5 1
7de6969f867aada10c175e9d4328942e
Details md5 1
4bb1827e37223b674ab7270f7b7bbb4d
Details Pdb 1
h:\hijacking\onedrive_hijacking\googledrive_rat_load_complete\googledrive_rat_load_complete\rat_load\release\rat_load.pdb
Details Threat Actor Identifier - APT-C 15
APT-C-55
Details Url 1
https://api.onedrive.com/v1.0/drives/+path1+/items/+path2+select=id,@content.downloadurl+authkey获取后续请求地址hxxps://qizzhq.dm.files.1drv.com/y4mz739xhv5a59pon-9e5_f3u7qk1a-jzwn-c_k-ja3a72_w-5vxa9zax_ymjfirdu4,请求上述地址获取到加密数据,利用vbs脚本解密后执行,最后收集用户相关信息上传至apt组织服务器ielsems.com
Details Url 1
https://api.onedrive.com/v1.0/drives/+path1+/items/+path2+select=id,@content.downloadurl
Details Url 1
https://ielsems.com/cic/macro.php?na=
Details Url 1
https://mp.weixin.qq.com/s/og8mfnqokzshlojdidkygq
Details Url 1
https://mp.weixin.qq.com/s/pkck1ryxvgwfuohqk9rahg),且pdb路径h:\hijacking\onedrive_hijacking\googledrive_rat_load_complete\googledrive_rat_load_complete\rat_load\release\rat_load.pdb与近期披露的babyshark组件路径吻合
Details Url 1
https://qizzhq.dm.files.1drv.com/y4mz739xhv5a59pon-9e5_f3u7qk1a-jzwn-c_k-ja3a72_w-5vxa9zax_ymjfirdu4
Details Url 2
https://mp.weixin.qq.com/s/pkck1ryxvgwfuohqk9rahg
Details Url 2
https://www.huntress.com/blog/targeted-apt-activity-babyshark-is-out-for-blood