text
stringlengths
0
1.99k
exist at 11/05/2025 19:41:23 [horedi179] get onnara9.saas.gcloud.go.kr at \
11/05/2025 19:41:23
[horedi179] get https://onnara9.saas.gcloud.go.kr/ at 11/05/2025 19:45:37
[horedi179] main_job:Session 0c446a8c-e913-467d-a9b9-3f08abfb6f7a does not \
exist at 11/05/2025 19:45:37
[horedi179] get https://onnara9.saas.gcloud.go.kr/SSO.do at 11/05/202...
............................................................................
The corresponding code:
............................................................................
drives = instanceManger(config_hub)
client = Client(config_hub)
plugins = PluginManager()
try:
onnara = onnara_sso("horedi79", "", "", "1250000","onnara9")
klass = plugins.load(os.path.join(os.getcwd(),
"scripts", target_project, "onLaunch.py"),
opts={'onnara':onnara,'drives': drives, "client": client})
............................................................................
The hostname 'onnara9.saas.gcloud.go.kr' is not accessible from the public
Internet, however the domain name appears in some documents mentioned as an
internal government portal. KIM seems to have access to this network.
----[ 1.4 Miscellaneous
- His origin IP was 156.59.13.153 (Singapore). The IP has SSHD running on
port 60233 and port 4012 shows a TLS certificate with CN=*.appletls.com.
Fofa shows around 1,100 uniq IP addresses with that certificate. Most
(>90%) are located in China and HK. These may be some VPN proxy network or
Operational Relay Boxes (ORBs). (Similar to "Superjumper" and [#15])
- On the 13th of June 2025, KIM registered webcloud-notice.com. We believe
this to be in preparation for a future phishing attack.
- There is a cert and private key for rc.kt.co.kr, South Korea
Telecom's Remote Control Service. It runs remote support backend from
https://www.rsupport.com. Kim may have access to any company that Korea
Telecom was providing remote support for.
- Lots of passwords in mnt/hgfs/Desktop/111/account/account.txt from "LG
Uplus" (LGU), a South Korean mobile operator. The favicon-search indicates
that KIM first hacked into SECUREKI, a company supplying MFA and password
services to LGU and from there pivoted into LGU's internal network.
- APPM_TRANS.txt and 111/config.txt contain credentials to internal servers
at LGU.
- gpki.7z = government-PKI: contains internal data about the South Korean
Government Public Key Infrastructure. See also GPKISecureWebX and
111/2.rar (more below).
- ROOT.zip contains the source code for the APPM security solution that was
initially hacked by KIM. The file app_one_cmd.py is the decompiled python
program for the APPM security solution.
- His google search history deserves a closer look. Especially around
chacha20 and arc4. The chrome temp files should get some attention.
- He seems to download his Dev Tools from [#16] and stole his IDA Pro
license from a now disused TOR address [#17].
- The Google Chrome configuration files contain these links. Does KIM use
(his?) google creds to access these sites? Is wwh1004 his GitHub account?
Did he use google-pay to pay for the three VPN services?
............................................................................
"https://accounts.google.com:443,https://[*.]0x1.gitlab.io":
"https://accounts.google.com:443,https://[*.]aldeid.com":
"https://accounts.google.com:443,https://[*.]asawicki.info":
"https://accounts.google.com:443,https://[*.]devglan.com":
"https://accounts.google.com:443,https://[*.]edureka.co":
"https://accounts.google.com:443,https://[*.]johnwu.cc":
"https://accounts.google.com:443,https://[*.]majorgeeks.com":
"https://accounts.google.com:443,https://[*.]maskray.me":
"https://accounts.google.com:443,https://[*.]namecheap.com":
"https://accounts.google.com:443,https://[*.]qwqdanchun.com":
"https://accounts.google.com:443,https://[*.]rakuya.com.tw":
"https://accounts.google.com:443,https://[*.]redteaming.top":
"https://accounts.google.com:443,https://[*.]reversecoding.net":
"https://accounts.google.com:443,https://[*.]shhoya.github.io":
"https://accounts.google.com:443,https://[*.]sparktoro.com":
"https://accounts.google.com:443,https://[*.]tutorialspoint.com":
"https://accounts.google.com:443,https://[*.]wiseindy.com":
"https://accounts.google.com:443,https://[*.]wwh1004.com":
"https://accounts.google.com:443,https://[*.]wwh1004.github.io":
"https://pay.google.com:443,https://[*.]purevpn.com":
"https://pay.google.com:443,https://[*.]purevpn.com.tw":
"https://pay.google.com:443,https://[*.]zoogvpn.com":
............................................................................
- KIM uses Google-translate to translate error messages to Chinese
- A number of Taiwan government and military websites appear in his Chrome
history
- The certificate of South Korean's citizens require a deeper look and why
he has segregated university professors specifically.