疑似Lazarus组织针对韩国的攻击活动分析
Common Information
Type Value
UUID bc305ff9-abab-457e-838b-aadde57c7825
Fingerprint 37498f429eb84e6f
Analysis status DONE
Considered CTI value 2
Text language
Published Aug. 16, 2022, midnight
Added to db Jan. 16, 2023, 3:51 p.m.
Last updated Nov. 17, 2024, 6:53 p.m.
Headline 研究报告
Title 疑似Lazarus组织针对韩国的攻击活动分析
Detected Hints/Tags/Attributes 5/1/48
Attributes
Details Type #Events CTI Value
Details Domain 28
dl.dropboxusercontent.com
Details File 2
klec.docx
Details File 1
西江大学韩国语言教育中心.docx
Details File 2
下载恶意载荷并将其注入到winword.exe
Details File 2
下载到的恶意载荷主要用于释放下载工具ieupdate.exe
Details File 4
ieupdate.exe
Details File 2
目前已知存在两种载荷hvncengine.dll
Details File 2
和shellengine.dll
Details File 2
temp2.dot
Details File 2
%localappdata%\microsoft\playready下释放ieupdate.exe
Details File 2
和error.log
Details File 2
之后通过fodhelper.exe
Details File 2
绕过uac提升ieupdate.exe
Details File 49
error.log
Details File 15
server.txt
Details File 2
恶意载荷释放的文件以及error.log
Details File 2
将ieupdate.exe
Details File 10
myapp.exe
Details File 9
v3l4sp.exe
Details File 2
%localappdata%\microsoft\playready\ieupdate.exe
Details File 2
则关闭先前的ieupdate.exe
Details File 2
与从error.log
Details File 2
将收集到的信息发送到post2.php
Details File 2
应为ieupdate.exe
Details File 2
hvncengine.dll
Details File 2
首先和ieupdate.exe
Details File 2
与ieupdate.exe
Details File 3
打开explorer.exe
Details File 2
启动chrome.exe
Details File 2
shellengine.dll
Details File 2
创建管道用于与cmd.exe
Details File 2
并将cmd.exe
Details File 2
获取cmd.exe
Details File 2
重启cmd.exe
Details File 2
进程或者通过cmd.exe
Details File 2
又根据模板文件中包含的vba代码以及ieupdate.exe
Details File 2
与shellengine.dll
Details File 2
带有恶意宏的模板文件和ieupdate.exe
Details File 2
通过fodhelper.exe
Details File 2
注入到winword.exe
Details File 1
样本还利用fodhelper.exe
Details md5 2
f1a61ee026eac8583ee840d297792478
Details md5 2
8D7C3F3C56AD3069908901790ADFA826
Details md5 2
c073012bc50b6a4f55f8edcce294a0b4
Details md5 2
5beade9f8191c6a9c47050d4e3771b80
Details IPv4 2
23.106.160.173
Details Threat Actor Identifier - APT 144
APT38
Details Url 2
http://23.106.160.173/temp2.dotm