Andariel Hackers Attacking Asset Management Companies to Inject Malicious Code

The Andariel threat group was observed conducting persistent attacks against domestic businesses, specifically installing MeshAgent for remote screen control while conducting the attack.

MeshAgent collects basic system information for remote management and performs activities such as power and account management, chat or message pop-ups, file upload/download, and command execution

It also has remote desktop support. In particular, the web supports remote desktop protocols like RDP and VNC.

“The attacker exploited domestic asset management solutions to install malicious code, most notably AndarLoader and ModeLoader”, AhnLab Security Intelligence Center (ASEC) shared with Cyber Security News.

Among the threat groups currently targeting Korea are the Andariel group, the Kimsuky group, and the Lazarus group. 

As part of the initial access, it has also been known to launch supply chain, spear phishing, or watering hole attacks.

The malware is spread by taking advantage of installed software or flaws in the attack process.

Several Malware Backdoors Employed

AndarLoader is similar to Andardoor, discovered in an attack case that misused the Innorix Agent.

However, in contrast to Andardoor, the majority of the backdoor functions used by AndarLoader carry out the attacker’s commands via binary, executable data obtained from the C&C server, such as the .NET assembly.

“The AndarLoader confirmed this time is characterized by being obfuscated using KoiVM, unlike past types that were obfuscated with the Dotfuscator tool,” researchers said.

The attacker erased the compromised system’s security event log using AndarLoader and the command “wevtutil cl security.”

AndarLoader obfuscated with KoiVM

Additionally, MeshAgent gathers the fundamental system information needed for remote management.

The use of MeshAgent by the Andariel group was first verified, and it was downloaded externally under the name “fav.ico.”

MeshAgent installation log

ModeLoader is a JavaScript malware that the Andariel group has been using nonstop in the past.

It is downloaded and run externally via Mshta rather than being created as a file. 

“Attackers mainly exploit asset management solutions to execute the Mshta command that downloads ModeLoader”, researchers said.

ModeLoader executing commands received from the C&C server

Researchers say the attack campaign verified a feature:

in the majority of attack cases, keylogger malware was also detected.

The malware records data copied to the clipboard and keylogger and offers keylogging functionality.

Since its previous use of Innorix Agent, the Andariel group has been consistently abusing the asset management solutions of domestic businesses to disseminate malware during lateral movement.

Recommendation

Users must exercise extra caution when opening executable files from websites or attachments to emails from unknown senders.

Corporate security employees ought to strengthen asset management solution monitoring and apply fixes when there are program security flaws.

Also, take precautions to avoid being infected by this kind of malware beforehand by updating the most recent patches and V3 for operating systems and web browsers.

With Perimeter81 malware protection, you can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits. All are incredibly harmful and can wreak havoc on your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

New VIPKeyLogger Via Weaponized Office Documenrs Steals Login Credentials

The VIPKeyLogger infostealer, exhibiting similarities to the Snake Keylogger, is actively circulating through phishing campaigns. …

7 hours ago

INTERPOL Urges to End ‘Pig Butchering’ & Replaces With “Romance Baiting”

INTERPOL has called for the term "romance baiting" to replace "pig butchering," a phrase widely…

7 hours ago

New I2PRAT Malware Using encrypted peer-to-peer communication to Evade Detections

Cybersecurity experts are sounding the alarm over a new strain of malware dubbed "I2PRAT," which…

8 hours ago

Earth Koshchei Employs RDP Relay, Rogue RDP server in Server Attacks

 A new cyber campaign by the advanced persistent threat (APT) group Earth Koshchei has brought…

9 hours ago

Careto – A legendary Threat Group Targets Windows By Deploy Microphone Recorder And Steal Files

Recent research has linked a series of cyberattacks to The Mask group, as one notable…

10 hours ago

RiseLoader Attack Windows By Employed A VMProtect To Drop Multiple Malware Families

RiseLoader, a new malware family discovered in October 2024, leverages a custom TCP-based binary protocol…

10 hours ago