Thursday, November 21, 2024
Tactical Analysis

New DPRK Malware Analysis Reports

CISA, FBI, and DOD released three new DPRK Malware Analysis Reports yesterday, and uploaded samples to VirusTotal. These joint reports were published on the three-year anniversary of the WannaCry campaign, which has been attributed to DPRK state-sponsored threat actors. This joint reporting follows the USG strategy of putting pressure on DPRK cyber theft activities by increasing public awareness of threat actor TTPs.

CopperHedge, TaintedScribe, and PebbleDash

CopperHedge is a variant of the Manuscrypt family of Remote Access Trojans (RATs), which is capable of running commands on the target system, gathering information about the system, and exfiltrating data from the system. Six variants of CopperHedge are presented in the MAR. While this family of malware has primarily targeted cryptocurrency exchanges and other entities associated with cryptocurrency, one of these variants was first observed in February 2018 in association with Operation GhostSecret, a global data reconnaissance campaign that targeted multiple industry sectors.

https://www.virustotal.com/graph/g48e7ca403f52c1e031f419deb952af0d7ec965f6f6daf47a897ef1c4d41d165e

TaintedScribe and PebbleDash are beaconing implants that receive and execute attacker’s commands, and can further download, upload, delete, and execute files. TaintedScribe disguises itself as Microsoft Narrator and utilizes FakeSSL to obfuscate network communications.

https://www.virustotal.com/gui/file/106d915db61436b1a686b86980d4af16227776fc2048f2888995326db0541438/details

PebbleDash also utilizes FakeSSL to obfuscate network communications and obfuscates API calls using a custom XOR algorithm.

Indicators

The joint reporting provides IOCs in the STIX format. Additionally, the open source platform OTX provides IOCs available for download in multiple formats.