Monday, March 10, 2025
Homecyber securityNorth Korean Hackers Use ZIP Files to Deploy Malicious PowerShell Scripts

North Korean Hackers Use ZIP Files to Deploy Malicious PowerShell Scripts

Published on

SIEM as a Service

Follow Us on Google News

North Korean state-sponsored hackers, known as APT37 or ScarCruft, have been employing sophisticated tactics to breach systems, leveraging malicious ZIP files containing LNK files to initiate attacks.

These LNK files, often disguised as documents related to North Korean affairs or trade agreements, are distributed via phishing emails.

Once opened, they trigger a multi-stage attack involving PowerShell scripts and batch files, ultimately deploying the RokRat remote access Trojan (RAT) as the final payload.

PowerShell Scripts
Infection Flow Diagram

Infection Flow and Technical Details

The infection process begins with phishing emails that appear critical, using real information from websites to enhance their credibility.

These emails contain ZIP attachments with malicious LNK files.

When executed, the LNK file checks if it’s running from System32 or Program Files and moves to the %temp% directory if necessary.

It then extracts several payloads, including a decoy HWPX document, a batch script named shark.bat, and other files like caption.dat and elephant.dat.

PowerShell Scripts
content of HWPX document

The shark.bat script executes PowerShell commands in a hidden window, loading and executing the elephant.dat script, which decrypts the caption.dat file using a single-byte XOR key.

This decrypted content is then executed in memory, leading to the deployment of the RokRat RAT.

RokRat is designed to gather detailed system information, including OS version, computer name, and logged-in user details.

It also captures screenshots and enumerates running processes, exfiltrating this data to command-and-control (C2) servers via cloud services like pCloud, Yandex, and Dropbox.

The malware uses these platforms’ APIs to send, download, and delete files, embedding OAuth tokens for seamless communication.

Additionally, RokRat can execute remote commands, allowing attackers to perform data exfiltration, system reconnaissance, and process termination.

Anti-Analysis Techniques and C2 Communications

To evade detection, RokRat employs anti-analysis techniques such as detecting VMware Tools to identify virtual environments and using sandbox detection methods like creating and deleting temporary files.

According to the researchers, it also checks for debuggers using IsDebuggerPresent.

The malware encrypts its communications using XOR and RSA encryption, ensuring that only the attackers can decrypt the data.

Commands from the C2 server are received in AES-CBC encrypted form, decrypted locally, and executed on the system.

These commands can include data collection, file deletion, and termination of the malware process.

The use of legitimate cloud services for C2 operations allows RokRat to blend into normal network traffic, making it challenging to detect.

This sophisticated approach highlights the evolving tactics of APT37, as they continue to adapt and expand their operations beyond traditional targets, now focusing on both Windows and Android platforms through phishing campaigns.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Critical Microsoft’s Time Travel Debugging Tool Vulnerability Let Attackers Mask Detection

Microsoft’s Time Travel Debugging (TTD) framework, a powerful tool for recording and replaying Windows...

ServiceNow Acquires Moveworks for $2.85 Billion to Boost AI Capabilities

In a landmark move to strengthen its position in the rapidly evolving artificial intelligence...

Apple iOS 18.4 Beta 3 Released – What’s New!

Apple released iOS 18.4 Beta 3 on March 10, 2025, for developers, with a...

Researcher Hacks Embedded Devices to Uncover Firmware Secrets

In a recent exploration of embedded device hacking, a researcher demonstrated how to extract...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Critical Microsoft’s Time Travel Debugging Tool Vulnerability Let Attackers Mask Detection

Microsoft’s Time Travel Debugging (TTD) framework, a powerful tool for recording and replaying Windows...

ServiceNow Acquires Moveworks for $2.85 Billion to Boost AI Capabilities

In a landmark move to strengthen its position in the rapidly evolving artificial intelligence...

Apple iOS 18.4 Beta 3 Released – What’s New!

Apple released iOS 18.4 Beta 3 on March 10, 2025, for developers, with a...