text stringlengths 0 1.99k |
|---|
- The work/home/user/.cache/vmware/drag_and_drop/ folder contains files that |
KIM was moving between his Windows and Linux machines. These files include |
cobalt strike loaders and reverse shells written in powershell. A compiled |
version of Onnara code as well as Onnara modules for proxying into the |
government network and more. |
- In the directory work/home/user/.config/google-chrome/Default/ are many |
interesting files (.com.google.Chrome*) which give us some insights on |
interests, search habits, and accessed websites by "KIM". From these we |
can learn that he is often concerned with cobalt strike (CS) survival, |
wondering why Kunming is in the Center of Central Inspection Team, and is |
a big fan of a variety of GitHub projects. He also frequents freebuf.com, |
xaker.ru, and uses Google translator to read |
accessibility-moda-gov-tw.translate.goog (translating from taiwanese). |
- The file voS9AyMZ.tar.gz and Black.x64.tar.gz need a closer look. The |
binary hashes are not known to virustotal but the names look inviting: |
- 2bcef4444191c7a5943126338f8ba36404214202 payload.bin |
- e6be345a13641b56da2a935eecfa7bdbe725b44e payload_test.bin |
- 3e8b9d045dba5d4a49f409f83271487b5e7d076f s.x64.bin |
- His bash_history shows SSH connections to computers on his local network. |
- Pete Hegseth would say "He is currently clean on OPSEC" |
--[ 2. The Artifacts |
This section analyzes six of Kimsuky's backdoors and artifacts. This work is |
neither complete nor finished. It is a start to get you excited and learn |
how Kimsuky operates and what tools they are using. |
----[ 2.1 Generator vs Defense Counterintelligence Command |
Drop Location: vps/var/www/html/ |
The phishing tool exposes a https website (the phishing-website) under a |
domain name similar to one that the victim knows and trusts. The victims |
at dcc.mil.kr are then sent a link to the phishing-website. The attacker |
then hopes that the victim will enter their login credentials into the |
phishing-website. |
The final redirection of the victim is away from the phishing-website and |
to an URI on the legitimate website. It is an URI that always throws |
a login-error. This is a targeted attack and the attacker had to find |
such an URI on the legitimate website of https://dcc.mil.kr. |
The benefit of this "trick" is that the victim will see an error from |
https://dcc.mil.kr (which he knows and trusts) even though his credentials |
were submitted to the phishing-website. |
-[ config.php: |
Contains a long IP black list (and other blacklists) so that companies |
like Trend Micro and Google are unable to find the phishing site. |
-[ generator.php: |
This is the remote admin interface to administrate the phishing attack. It |
is accessible via a configurable password. However, the cookie is hardcoded |
and the admin-interface can be accessed without a password and by setting |
the cookie instead: |
............................................................................ |
curl -v --cookie "HnoplYTfPX=x" https://phishing-site/generator.php |
............................................................................ |
It's trivial to scan the Internet and find phishing results: |
............................................................................ |
curl -v --cookie "HnoplYTfPX=x" https://phishing-site/logs.php |
............................................................................ |
----[ 2.2 Tomcat remote Kernel Backdoor |
Drop location: mnt/hgfs/Desktop/tomcat20250414_rootkit_linux234/ |
This is a kernel level remote backdoor. It allows an attacker to access a |
host remotely and hide. The drop contains the client (tcat.c), the server |
side LKM (vmwfxs.mod.c) and userland backdoor (master.c). |
The client communicates with the victim's server via (direct) TCP. The LKM |
sniffs for any TCP connection that matches a specific TCP-SEQ + IP-ID |
combination (see below). The LKM communicates via `/proc/acpi/pcicard` with |
its companion master.c userland backdoor. |
The master password is `"Miu2jACgXeDsxd"`. |
The client uses `"!@nf4@#fndskgadnsewngaldfkl"`. |
The script `tomcat20250414_rootkit_linux2345/config.sh` dynamically creates |
new secret IDs and strings for every installation and saves them to |
install.h. The master password is hardcoded and does not change. |
-[ work/common.c: |
Compiled into the client and the master. It contains many old private keys. |
The newer backdoor generates these keys dynamically |
(see `install_common.c`). |
-[ lkm - vmwfxs.mod.c: |
The is the "stub" of the LKM to hook the needed kernel functions. |
-[ lkm - main.c: |
Process, network-connection, and file hiding takes place here. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.