text stringlengths 0 1.99k |
|---|
exist at 11/05/2025 19:41:23 [horedi179] get onnara9.saas.gcloud.go.kr at \ |
11/05/2025 19:41:23 |
[horedi179] get https://onnara9.saas.gcloud.go.kr/ at 11/05/2025 19:45:37 |
[horedi179] main_job:Session 0c446a8c-e913-467d-a9b9-3f08abfb6f7a does not \ |
exist at 11/05/2025 19:45:37 |
[horedi179] get https://onnara9.saas.gcloud.go.kr/SSO.do at 11/05/202... |
............................................................................ |
The corresponding code: |
............................................................................ |
drives = instanceManger(config_hub) |
client = Client(config_hub) |
plugins = PluginManager() |
try: |
onnara = onnara_sso("horedi79", "", "", "1250000","onnara9") |
klass = plugins.load(os.path.join(os.getcwd(), |
"scripts", target_project, "onLaunch.py"), |
opts={'onnara':onnara,'drives': drives, "client": client}) |
............................................................................ |
The hostname 'onnara9.saas.gcloud.go.kr' is not accessible from the public |
Internet, however the domain name appears in some documents mentioned as an |
internal government portal. KIM seems to have access to this network. |
----[ 1.4 Miscellaneous |
- His origin IP was 156.59.13.153 (Singapore). The IP has SSHD running on |
port 60233 and port 4012 shows a TLS certificate with CN=*.appletls.com. |
Fofa shows around 1,100 uniq IP addresses with that certificate. Most |
(>90%) are located in China and HK. These may be some VPN proxy network or |
Operational Relay Boxes (ORBs). (Similar to "Superjumper" and [#15]) |
- On the 13th of June 2025, KIM registered webcloud-notice.com. We believe |
this to be in preparation for a future phishing attack. |
- There is a cert and private key for rc.kt.co.kr, South Korea |
Telecom's Remote Control Service. It runs remote support backend from |
https://www.rsupport.com. Kim may have access to any company that Korea |
Telecom was providing remote support for. |
- Lots of passwords in mnt/hgfs/Desktop/111/account/account.txt from "LG |
Uplus" (LGU), a South Korean mobile operator. The favicon-search indicates |
that KIM first hacked into SECUREKI, a company supplying MFA and password |
services to LGU and from there pivoted into LGU's internal network. |
- APPM_TRANS.txt and 111/config.txt contain credentials to internal servers |
at LGU. |
- gpki.7z = government-PKI: contains internal data about the South Korean |
Government Public Key Infrastructure. See also GPKISecureWebX and |
111/2.rar (more below). |
- ROOT.zip contains the source code for the APPM security solution that was |
initially hacked by KIM. The file app_one_cmd.py is the decompiled python |
program for the APPM security solution. |
- His google search history deserves a closer look. Especially around |
chacha20 and arc4. The chrome temp files should get some attention. |
- He seems to download his Dev Tools from [#16] and stole his IDA Pro |
license from a now disused TOR address [#17]. |
- The Google Chrome configuration files contain these links. Does KIM use |
(his?) google creds to access these sites? Is wwh1004 his GitHub account? |
Did he use google-pay to pay for the three VPN services? |
............................................................................ |
"https://accounts.google.com:443,https://[*.]0x1.gitlab.io": |
"https://accounts.google.com:443,https://[*.]aldeid.com": |
"https://accounts.google.com:443,https://[*.]asawicki.info": |
"https://accounts.google.com:443,https://[*.]devglan.com": |
"https://accounts.google.com:443,https://[*.]edureka.co": |
"https://accounts.google.com:443,https://[*.]johnwu.cc": |
"https://accounts.google.com:443,https://[*.]majorgeeks.com": |
"https://accounts.google.com:443,https://[*.]maskray.me": |
"https://accounts.google.com:443,https://[*.]namecheap.com": |
"https://accounts.google.com:443,https://[*.]qwqdanchun.com": |
"https://accounts.google.com:443,https://[*.]rakuya.com.tw": |
"https://accounts.google.com:443,https://[*.]redteaming.top": |
"https://accounts.google.com:443,https://[*.]reversecoding.net": |
"https://accounts.google.com:443,https://[*.]shhoya.github.io": |
"https://accounts.google.com:443,https://[*.]sparktoro.com": |
"https://accounts.google.com:443,https://[*.]tutorialspoint.com": |
"https://accounts.google.com:443,https://[*.]wiseindy.com": |
"https://accounts.google.com:443,https://[*.]wwh1004.com": |
"https://accounts.google.com:443,https://[*.]wwh1004.github.io": |
"https://pay.google.com:443,https://[*.]purevpn.com": |
"https://pay.google.com:443,https://[*.]purevpn.com.tw": |
"https://pay.google.com:443,https://[*.]zoogvpn.com": |
............................................................................ |
- KIM uses Google-translate to translate error messages to Chinese |
- A number of Taiwan government and military websites appear in his Chrome |
history |
- The certificate of South Korean's citizens require a deeper look and why |
he has segregated university professors specifically. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.