APT37黑客利用武器化快捷方式文件和Dropbox进行命令和控制操作
朝鲜支持的黑客组织APT37发起针对关注朝鲜问题活动人士的鱼叉式网络钓鱼攻击。该活动利用Dropbox等云服务作为C2基础设施,并通过伪装成合法文档的恶意LNK文件传播RoKRAT恶意软件。该恶意软件采用无文件技术,在内存中执行代码以规避检测,并收集系统信息及数据外泄至云服务器。 2025-5-12 18:50:0 Author: gbhackers.com(查看原文) 阅读量:5 收藏

The North Korean state-sponsored hacking group APT37, also known as ScarCruft, launched a spear phishing campaign targeting activists focused on North Korean issues.

Named “Operation: ToyBox Story” by Genians Security Center (GSC), this campaign exploited legitimate cloud services, primarily Dropbox, as command-and-control (C2) infrastructure to evade detection.

The attackers delivered malicious shortcut (LNK) files disguised as legitimate documents via phishing emails, luring victims with tailored content related to North Korean troop deployments in Russia and a fictitious national security conference hosted by a South Korean think tank.

- Advertisement - Google News

Weaponized LNK Files
Malicious LNK File Structure

These emails contained Dropbox links to ZIP archives that, when extracted, executed malicious payloads, including the notorious RoKRAT malware, designed for data exfiltration and system reconnaissance.

Campaign Targets North Korea Activists

The technical sophistication of APT37’s attack lies in its use of fileless malware techniques, leveraging weaponized LNK files to execute hidden PowerShell commands without leaving detectable footprints on the disk.

Weaponized LNK Files
Flowchart of the APT37 Attack

Upon execution, these LNK files trigger a multi-stage infection process, creating temporary files in the %Temp% directory and deploying decoy documents to maintain the illusion of legitimacy.

The payload, identified as RoKRAT, exhibits advanced behavior, including system information collection (such as OS build version, device name, and BIOS details), real-time screenshot capture saved as hexadecimal-named temporary files, and encrypted data exfiltration to cloud-based C2 servers like Dropbox, pCloud, and Yandex.

RoKRAT Payload Analysis

The malware encrypts collected data using a combination of XOR obfuscation, AES-CBC-128, and RSA-encrypted keys, ensuring secure communication with C2 endpoints.

Notably, Dropbox access tokens linked to Russian Yandex email accounts were used for authentication, highlighting APT37’s reliance on “Living off Trusted Sites” (LoTS) tactics to mask their operations.

The malware’s ability to execute dynamic code in memory further complicates detection by traditional antivirus solutions, emphasizing the need for Endpoint Detection and Response (EDR) systems with anomaly hunting capabilities, as demonstrated by Genian EDR’s real-time threat identification and detailed process tracking.

This campaign underscores APT37’s persistent use of RoKRAT, with code similarities to prior attacks like the February 2025 K-Messenger HWP document distribution, as confirmed by static analysis tools like Capa.

The group’s infrastructure also reveals consistent patterns, including the use of VPN services like NordVPN and AstrillVPN to obfuscate their origins.

GSC’s investigation, supported by HUMINT and international intelligence-sharing, identified multiple email accounts tied to the threat actor, some potentially linked to impersonated LinkedIn profiles.

Organizations are urged to bolster defenses by monitoring endpoint activity, avoiding execution of unknown LNK files, and leveraging advanced EDR solutions to detect fileless threats and malicious cloud API interactions mapped to MITRE ATT&CK frameworks.

Indicators of Compromise (IoC)

TypeValue
MD5 Hashes81c08366ea7fc0f933f368b120104384, 723f80d1843315717bc56e9e58e89be5, etc.
C2 IPs89.147.101.65, 89.147.101.71, 37.120.210.2
Email Accounts[email protected], [email protected], [email protected], etc.

Setting Up SOC Team? – Download Free Ultimate SIEM Pricing Guide (PDF) For Your SOC Team -> Free Download

Aman Mishra

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.


文章来源: https://gbhackers.com/apt37-hackers-use-weaponized-lnk-files-and-dropbox/
如有侵权请联系:admin#unsafe.sh