Kimsuky Targets Organizations with Evolving PebbleDash-Based Tools
Kimsuky, a North Korean APT group, is actively targeting organizations, primarily in South Korea, with evolving tactics and tools, leveraging spear-phishing emails and messenger contacts to deploy malware such as PebbleDash and AppleSeed for establishing backdoors and stealing information.
Kimsuky, also known as APT43, Ruby Sleet, Black Banshee, Sparkling Pisces, Velvet Chollima, and Springtail, is a prolific Korean-speaking threat actor that has been active since at least 2013. Kaspersky researchers have observed tactical shifts in the group’s recent campaigns, including the use of new malware variants based on the PebbleDash platform and connections to the AppleSeed malware cluster. Kimsuky has been leveraging legitimate tools, such as VSCode Tunneling and Cloudflare Quick Tunnels, as well as the open-source DWAgent remote monitoring and management tool. These activities primarily target South Korean entities in both the public and private sectors, with PebbleDash attacks also observed in Brazil and Germany. The group uses spear-phishing emails and messenger contacts to deliver malicious attachments.
Attack Chain
- Kimsuky initiates the attack by sending spear-phishing emails or contacting targets via messengers.
- The initial contact leads to the delivery of a malicious attachment disguised as a document, such as a compressed file.
- The attachments contain droppers in formats like .JSE, .EXE, .PIF, or .SCR, with filenames designed to entice the recipient to open them.
- JSE droppers decode Base64-encoded blobs, including a benign lure file and malicious code, storing them in locations like C:\ProgramData with random filenames.
- The benign lure file is opened to deceive the user, while the malicious payload uses
powershell.exe -windowstyle hidden certutil -decode [src path] [dst path]for further decoding. - The final payload is executed via command-line instructions, such as
regsvr32.exe /s [file path]orrundll32.exe [file path] [export function]. - Reger Dropper (.SCR) and Pidoc Dropper (.PIF) decrypt their payloads using XOR operations before deploying files in directories like %temp% or C:\ProgramData.
- Post-exploitation, Kimsuky uses legitimate tools like Visual Studio Code (VSCode) and DWAgent for remote access and control, ultimately aiming to establish backdoors and steal information from the compromised systems.
Impact
Kimsuky primarily targets South Korean entities, including both public and private sectors. The PebbleDash cluster has also been observed targeting the medical, military, and defense industries worldwide, with compromises of Brazilian and South Korean defense organizations, as well as a German defense firm. A successful attack leads to the establishment of backdoors, data theft, and potential disruption of critical services. In 2024, the South Korean government released a security advisory regarding the AppleSeed cluster, demonstrating the significant impact of these attacks.
Recommendation
- Monitor process creation events for the execution of
regsvr32.exeorrundll32.exefrom unusual locations like%temp%orC:\ProgramData(see Attack Chain step 6) to detect potential malware execution. Deploy the Sigma rule “Detect Suspicious Regsvr32/Rundll32 Execution from Unusual Locations” to your SIEM and tune for your environment. - Implement detections for JSE droppers decoding and executing payloads via
powershell.exeandcertutil.exe. Deploy the Sigma rule “Detect JSE Dropper with Certutil and Powershell” to your SIEM and tune for your environment. - Monitor for the execution of legitimate tools such as VSCode or DWAgent from unexpected locations or with unusual command-line arguments, indicating potential post-exploitation activity (see Attack Chain step 8).
- Scan your environment for the MD5 hashes listed in the IOC table to identify potentially compromised systems.
- Educate users about the risks of opening attachments from untrusted sources and verify the legitimacy of files before opening them, especially those disguised as documents or application installers (see Attack Chain step 2).
Detection coverage 2
Detect Suspicious Regsvr32/Rundll32 Execution from Unusual Locations
highDetects regsvr32.exe or rundll32.exe executing from suspicious locations like %temp% or C:\ProgramData, often used by malware droppers.
Detect JSE Dropper with Certutil and Powershell
mediumDetects JSE droppers using certutil to decode and powershell to execute payloads.
Detection queries are available on the platform. Get full rules →
Indicators of compromise
5
hash_md5
| Type | Value |
|---|---|
| hash_md5 | 995a0a49ae4b244928b3f67e2bfd7a6e |
| hash_md5 | 52f1ff082e981cbdfd1f045c6021c63f |
| hash_md5 | 65fc9f06de5603e2c1af9b4f288bb22c |
| hash_md5 | 8e15c4d4f71bdd9dbc48cd2cabc87806 |
| hash_md5 | 8983ffa6da23e0b99ccc58c17b9788c7 |