The APT37 risk group makes use of a brand new evasive malware and ‘M2RAT’ steganography to focus on folks for intelligence gathering.
APT37, often known as ‘RedEyes’ or ‘ScarCruft’, is a North Korean cyber espionage hacking group believed to be state-supported.
In 2022, the hacking group was seen exploiting Web Explorer zero-days and distributing all kinds of malware towards focused entities and people.
For instance, risk actors focused EU-based organizations with a brand new model of their cellular backdoor referred to as ‘Dolphin’, deployed a customized RAT (Distant Entry Trojan) referred to as ‘Konni’, and focused US journalists. with a extremely customizable malware referred to as ‘Golden Backdoor.
In a brand new report revealed as we speak by the AhnLab Safety Emergency Response Middle (ASEC), researchers clarify how APT37 now makes use of a brand new pressure of malware referred to as ‘M2RAT’ that makes use of a piece of shared reminiscence for instructions and knowledge exfiltration and leaves only a few traces. working on the contaminated machine.
Begin with phishing
The current assaults noticed by ASEC started in January 2023, when the group of hackers despatched phishing emails containing a malicious attachment to their targets.
Opening the attachment triggers the exploitation of an previous EPS vulnerability (CVE-2017-8291) within the Hangul phrase processor generally utilized in South Korea. The exploit will trigger shellcode to be executed on the sufferer’s pc that downloads and executes a malicious execution saved inside a JPEG picture.
This JPG picture file makes use of steganography, a method that enables code to be hidden inside recordsdata, to stealthily introduce the M2RAT executable (“lskdjfei.exe”) into the system and inject it into “explorer.exe”.

For persistence on the system, the malware provides a brand new worth (“RyPO”) within the “Run” registry key, with instructions to run a PowerShell script by way of “cmd.exe”. This identical command was additionally seen in a 2021 Kaspersky report on APT37.

M2RAT steals from Home windows and telephones
The M2RAT backdoor acts as a primary distant entry Trojan that performs keylogging, knowledge theft, command execution, and screenshot taking from the desktop.
The screenshot operate is activated periodically and works autonomously with out the necessity for a particular command from the operator.
The malware helps the next instructions, which gather info from the contaminated machine after which ship it to the C2 server for assessment by attackers.

The malware’s means to seek for moveable gadgets related to the Home windows pc, corresponding to smartphones or tablets, is especially attention-grabbing.
If a conveyable machine is detected, it would scan the contents of the machine for paperwork and voice recording recordsdata, and if discovered, copy them to the PC for leaking to the attacker’s server.
Previous to exfiltration, the stolen knowledge is compressed right into a password-protected RAR file, and the native copy is wiped from reminiscence to take away any traces.
One other attention-grabbing function of M2RAT is that it makes use of a shared reminiscence part for command and management (C2) communication, knowledge exfiltration, and direct switch of stolen knowledge to the C2 with out storing it on the compromised system.
Utilizing a piece of reminiscence on the host for the above capabilities minimizes swapping with C2 and makes evaluation tougher, as safety researchers have to research the reminiscence of contaminated gadgets to retrieve instructions and knowledge utilized by C2. malware.
In conclusion, APT37 continues to replace its customized toolkit with evasive malware that’s tough to detect and analyze.
That is very true when the targets are people, as within the current marketing campaign detected by ASEC, who lack the subtle risk detection instruments of bigger organizations.
–
RedEyes hackers use new malware to steal data from Windows, phones