17 February 2020

US authorities released new info about North Korean malware


US authorities released new info about North Korean malware

US Cyber Command, the Department of Homeland Security, and the Federal Bureau of Investigations have published six new Malware Analysis Reports (MARs) related to malicious cyber activity from North Korea. The released MARs are related to new malware families involved in new attacks conducted by North Korea-linked HIDDEN COBRA group (aka Lazarus group).

“Each of these MARs is designed to enable network defenders to identify and reduce exposure to North Korean government malicious cyber activity”, CISA says.

CISA urges all users and administrators to carefully review these MARs for each malware variant listed below.

AR20-045A — BISTROMATH (a full-featured RAT implant executable)

AR20–045B — SLICKSHOES (Themida-packed dropper that decodes and drops a file "C:\Windows\Web\taskenc.exe" which is a Themida-packed beaconing implant)

AR20-045C — CROWDEDFLOUNDER (a Themida packed 32-bit Windows executable, which is designed to unpack and execute a Remote Access Trojan (RAT) binary in memory)

AR20-045D — HOTCROISSANT (beaconing implant with variety of functions including the ability to conduct system surveys, upload/download files, execute processes and commands, perform screen captures)

AR20-045E — ARTFULPIE (an implant that performs downloading and in-memory loading and execution of a DLL from a hardcoded URL)

AR20-045F — BUFFETLINE (a full-featured beaconing implant).

The agencies also updated MARs report that includes information about the HOPLIGHT proxy-based backdoor Trojan that was first exposed in April 2019.

US Cyber Command also uploaded malware samples to VirusTotal noting that these tools are currently being used by threat actors for phishing and remote access in order to “steal funds and evade sanctions”.

Back to the list

Latest Posts

Cyber Security Week in Review: April 26, 2024

Cyber Security Week in Review: April 26, 2024

In brief: Cisco and CrushFTP patch zero-days, researchers sinkhole C&C server used by PlugX malware, and more.
26 April 2024
US charges Samourai cryptomixer founders with laundering $100 million

US charges Samourai cryptomixer founders with laundering $100 million

The cryptocurrency mixer facilitated over $2 billion in illegal transactions.
25 April 2024
ArcaneDoor state-sponsored malware campaign strikes Cisco networking gear

ArcaneDoor state-sponsored malware campaign strikes Cisco networking gear

The attackers exploited two zero-day vulnerabilities in Cisco networking equipment.
25 April 2024