Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Groups
  3. APT37

APT37

APT37 is a North Korean state-sponsored cyber espionage group that has been active since at least 2012. The group has targeted victims primarily in South Korea, but also in Japan, Vietnam, Russia, Nepal, China, India, Romania, Kuwait, and other parts of the Middle East.APT37 has also been linked to the following campaigns between 2016-2018: Operation Daybreak, Operation Erebus, Golden Time, Evil New Year, Are you Happy?, FreeMilk, North Korean Human Rights, and Evil New Year 2018.[1][2][3]

North Korean group definitions are known to have significant overlap, and some security researchers report all North Korean state-sponsored cyber activity under the nameLazarus Group instead of tracking clusters or subgroups.

ID: G0067
Associated Groups: InkySquid, ScarCruft, Reaper, Group123, TEMP.Reaper, Ricochet Chollima
Contributors: Valerii Marchuk, Cybersecurity Help s.r.o.
Version: 2.0
Created: 18 April 2018
Last Modified: 17 November 2024

Associated Group Descriptions

NameDescription
InkySquid

[4]

ScarCruft

[2][1][5]

Reaper

[1]

Group123

[1]

TEMP.Reaper

[1]

Ricochet Chollima

[6]

Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1548.002Abuse Elevation Control Mechanism:Bypass User Account Control

APT37 has a function in the initial dropper to bypass Windows UAC in order to execute the next payload with higher privileges.[5]

EnterpriseT1071.001Application Layer Protocol:Web Protocols

APT37 uses HTTPS to conceal C2 communications.[3]

EnterpriseT1123Audio Capture

APT37 has used an audio capturing utility known as SOUNDWAVE that captures microphone input.[1]

EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

APT37's has added persistence via the Registry keyHKCU\Software\Microsoft\CurrentVersion\Run\.[1][3]

EnterpriseT1059Command and Scripting Interpreter

APT37 has used Ruby scripts to execute payloads.[7]

.003Windows Command Shell

APT37 has used the command-line interface.[1][3]

.005Visual Basic

APT37 executes shellcode and a VBA script to decode Base64 strings.[3]

.006Python

APT37 has used Python scripts to execute payloads.[7]

EnterpriseT1555.003Credentials from Password Stores:Credentials from Web Browsers

APT37 has used a credential stealer known as ZUMKONG that can harvest usernames and passwords stored in browsers.[1]

EnterpriseT1005Data from Local System

APT37 has collected data from victims' local systems.[1]

EnterpriseT1561.002Disk Wipe:Disk Structure Wipe

APT37 has access to destructive malware that is capable of overwriting a machine's Master Boot Record (MBR).[1][3]

EnterpriseT1189Drive-by Compromise

APT37 has used strategic web compromises, particularly of South Korean websites, to distribute malware. The group has also used torrent file-sharing sites to more indiscriminately disseminate malware to victims. As part of their compromises, the group has used a Javascript based profiler called RICECURRY to profile a victim's web browser and deliver malicious code accordingly.[2][1][4]

EnterpriseT1203Exploitation for Client Execution

APT37 has used exploits for Flash Player (CVE-2016-4117, CVE-2018-4878), Word (CVE-2017-0199), Internet Explorer (CVE-2020-1380 and CVE-2020-26411), and Microsoft Edge (CVE-2021-26411) for execution.[2][1][3][4]

EnterpriseT1105Ingress Tool Transfer

APT37 has downloaded second stage malware from compromised websites.[1][5][4][7]

EnterpriseT1559.002Inter-Process Communication:Dynamic Data Exchange

APT37 has used Windows DDE for execution of commands and a malicious VBS.[2]

EnterpriseT1036.001Masquerading:Invalid Code Signature

APT37 has signed its malware with an invalid digital certificates listed as "Tencent Technology (Shenzhen) Company Limited."[2]

EnterpriseT1106Native API

APT37 leverages the Windows API calls: VirtualAlloc(), WriteProcessMemory(), and CreateRemoteThread() for process injection.[3]

EnterpriseT1027Obfuscated Files or Information

APT37 obfuscates strings and payloads.[3][5][7]

.003Steganography

APT37 uses steganography to send images to users that are embedded with shellcode.[3][5]

EnterpriseT1120Peripheral Device Discovery

APT37 has a Bluetooth device harvester, which uses Windows Bluetooth APIs to find information on connected Bluetooth devices.[5]

EnterpriseT1566.001Phishing:Spearphishing Attachment

APT37 delivers malware using spearphishing emails with malicious HWP attachments.[1][3][5]

EnterpriseT1057Process Discovery

APT37's Freenki malware lists running processes using the Microsoft Windows API.[3]

EnterpriseT1055Process Injection

APT37 injects its malware variant,ROKRAT, into the cmd.exe process.[3]

EnterpriseT1053.005Scheduled Task/Job:Scheduled Task

APT37 has created scheduled tasks to run malicious scripts on a compromised host.[7]

EnterpriseT1082System Information Discovery

APT37 collects the computer name, the BIOS model, and execution path.[3]

EnterpriseT1033System Owner/User Discovery

APT37 identifies the victim username.[3]

EnterpriseT1529System Shutdown/Reboot

APT37 has used malware that will issue the commandshutdown /r /t 1 to reboot a system after wiping its MBR.[3]

EnterpriseT1204.002User Execution:Malicious File

APT37 has sent spearphishing attachments attempting to get a user to open them.[1]

EnterpriseT1102.002Web Service:Bidirectional Communication

APT37 leverages social networking sites and cloud platforms (AOL, Twitter, Yandex, Mediafire, pCloud, Dropbox, and Box) for C2.[1][3]

Software

IDNameReferencesTechniques
S0657BLUELIGHT[4]Application Layer Protocol:Web Protocols,Archive Collected Data:Archive via Custom Method,Archive Collected Data,Credentials from Password Stores:Credentials from Web Browsers,Exfiltration Over C2 Channel,File and Directory Discovery,Indicator Removal:File Deletion,Ingress Tool Transfer,Obfuscated Files or Information:Encrypted/Encoded File,Process Discovery,Screen Capture,Software Discovery:Security Software Discovery,Steal Web Session Cookie,System Information Discovery,System Network Configuration Discovery,System Owner/User Discovery,System Time Discovery,Virtualization/Sandbox Evasion:System Checks,Web Service:Bidirectional Communication
S0154Cobalt Strike[4]Abuse Elevation Control Mechanism:Sudo and Sudo Caching,Abuse Elevation Control Mechanism:Bypass User Account Control,Access Token Manipulation:Parent PID Spoofing,Access Token Manipulation:Token Impersonation/Theft,Access Token Manipulation:Make and Impersonate Token,Account Discovery:Domain Account,Application Layer Protocol:DNS,Application Layer Protocol:Web Protocols,Application Layer Protocol:File Transfer Protocols,BITS Jobs,Browser Session Hijacking,Command and Scripting Interpreter:JavaScript,Command and Scripting Interpreter:Visual Basic,Command and Scripting Interpreter:PowerShell,Command and Scripting Interpreter:Python,Command and Scripting Interpreter:Windows Command Shell,Create or Modify System Process:Windows Service,Data Encoding:Standard Encoding,Data from Local System,Data Obfuscation:Protocol or Service Impersonation,Data Transfer Size Limits,Deobfuscate/Decode Files or Information,Encrypted Channel:Asymmetric Cryptography,Encrypted Channel:Symmetric Cryptography,Exploitation for Client Execution,Exploitation for Privilege Escalation,File and Directory Discovery,Hide Artifacts:Process Argument Spoofing,Impair Defenses:Disable or Modify Tools,Indicator Removal:Timestomp,Ingress Tool Transfer,Input Capture:Keylogging,Modify Registry,Native API,Network Service Discovery,Network Share Discovery,Non-Application Layer Protocol,Obfuscated Files or Information:Indicator Removal from Tools,Obfuscated Files or Information,Office Application Startup:Office Template Macros,OS Credential Dumping:LSASS Memory,OS Credential Dumping:Security Account Manager,Permission Groups Discovery:Domain Groups,Permission Groups Discovery:Local Groups,Process Discovery,Process Injection:Dynamic-link Library Injection,Process Injection:Process Hollowing,Process Injection,Protocol Tunneling,Proxy:Domain Fronting,Proxy:Internal Proxy,Query Registry,Reflective Code Loading,Remote Services:Remote Desktop Protocol,Remote Services:SSH,Remote Services:Windows Remote Management,Remote Services:SMB/Windows Admin Shares,Remote Services:Distributed Component Object Model,Remote System Discovery,Scheduled Transfer,Screen Capture,Software Discovery,Subvert Trust Controls:Code Signing,System Binary Proxy Execution:Rundll32,System Network Configuration Discovery,System Network Connections Discovery,System Service Discovery,System Services:Service Execution,Use Alternate Authentication Material:Pass the Hash,Valid Accounts:Domain Accounts,Valid Accounts:Local Accounts,Windows Management Instrumentation
S0212CORALDECK[1]Archive Collected Data:Archive via Utility,Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol,File and Directory Discovery
S0213DOGCALL[1][8]Audio Capture,Ingress Tool Transfer,Input Capture:Keylogging,Obfuscated Files or Information:Encrypted/Encoded File,Screen Capture,Web Service:Bidirectional Communication
S0355Final1stspy[8]Application Layer Protocol:Web Protocols,Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder,Deobfuscate/Decode Files or Information,Obfuscated Files or Information,Process Discovery,System Information Discovery
S0214HAPPYWORK[1]Ingress Tool Transfer,System Information Discovery,System Owner/User Discovery
S0215KARAE[1]Drive-by Compromise,Ingress Tool Transfer,System Information Discovery,Web Service:Bidirectional Communication
S0247NavRAT[9]Application Layer Protocol:Mail Protocols,Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder,Command and Scripting Interpreter:Windows Command Shell,Data Staged:Local Data Staging,Ingress Tool Transfer,Input Capture:Keylogging,Process Discovery,Process Injection,System Information Discovery
S0216POORAIM[1]Drive-by Compromise,File and Directory Discovery,Process Discovery,Screen Capture,System Information Discovery,Web Service:Bidirectional Communication
S0240ROKRAT[3][5]Application Layer Protocol:Web Protocols,Application Window Discovery,Audio Capture,Clipboard Data,Command and Scripting Interpreter:Visual Basic,Credentials from Password Stores:Credentials from Web Browsers,Credentials from Password Stores:Windows Credential Manager,Data from Local System,Debugger Evasion,Deobfuscate/Decode Files or Information,Execution Guardrails:Environmental Keying,Exfiltration Over C2 Channel,Exfiltration Over Web Service:Exfiltration to Cloud Storage,File and Directory Discovery,Indicator Removal:File Deletion,Ingress Tool Transfer,Input Capture:Keylogging,Modify Registry,Native API,Obfuscated Files or Information,Phishing:Spearphishing Attachment,Process Discovery,Process Injection,Query Registry,Screen Capture,System Information Discovery,System Owner/User Discovery,User Execution:Malicious File,Virtualization/Sandbox Evasion:System Checks,Web Service:Bidirectional Communication
S0217SHUTTERSPEED[1]Ingress Tool Transfer,Screen Capture,System Information Discovery
S0218SLOWDRIFT[1]Ingress Tool Transfer,System Information Discovery,Web Service:Bidirectional Communication
S0219WINERACK[1]Application Window Discovery,Command and Scripting Interpreter,File and Directory Discovery,Process Discovery,System Information Discovery,System Owner/User Discovery,System Service Discovery

References

×

[8]ページ先頭

©2009-2026 Movatter.jp