G0067 APT37
APT37 is a North Korean state-sponsored cyber espionage group that has been active since at least 2012. The group has targeted victims primarily in South Korea, but also in Japan, Vietnam, Russia, Nepal, China, India, Romania, Kuwait, and other parts of the Middle East. APT37 has also been linked to the following campaigns between 2016-2018: Operation Daybreak, Operation Erebus, Golden Time, Evil New Year, Are you Happy?, FreeMilk, North Korean Human Rights, and Evil New Year 2018.123
North Korean group definitions are known to have significant overlap, and some security researchers report all North Korean state-sponsored cyber activity under the name Lazarus Group instead of tracking clusters or subgroups.
Item | Value |
---|---|
ID | G0067 |
Associated Names | Richochet Chollima, InkySquid, ScarCruft, Reaper, Group123, TEMP.Reaper |
Version | 2.0 |
Created | 18 April 2018 |
Last Modified | 15 October 2021 |
Navigation Layer | View In ATT&CK® Navigator |
Associated Group Descriptions
Name | Description |
---|---|
Richochet Chollima | 4 |
InkySquid | 5 |
ScarCruft | 216 |
Reaper | 1 |
Group123 | 1 |
TEMP.Reaper | 1 |
Techniques Used
Domain | ID | Name | Use |
---|---|---|---|
enterprise | T1548 | Abuse Elevation Control Mechanism | - |
enterprise | T1548.002 | Bypass User Account Control | APT37 has a function in the initial dropper to bypass Windows UAC in order to execute the next payload with higher privileges.6 |
enterprise | T1071 | Application Layer Protocol | - |
enterprise | T1071.001 | Web Protocols | APT37 uses HTTPS to conceal C2 communications.3 |
enterprise | T1123 | Audio Capture | APT37 has used an audio capturing utility known as SOUNDWAVE that captures microphone input.1 |
enterprise | T1547 | Boot or Logon Autostart Execution | - |
enterprise | T1547.001 | Registry Run Keys / Startup Folder | APT37‘s has added persistence via the Registry key HKCU\Software\Microsoft\CurrentVersion\Run\ .13 |
enterprise | T1059 | Command and Scripting Interpreter | APT37 has used Ruby scripts to execute payloads.7 |
enterprise | T1059.003 | Windows Command Shell | APT37 has used the command-line interface.13 |
enterprise | T1059.005 | Visual Basic | APT37 executes shellcode and a VBA script to decode Base64 strings.3 |
enterprise | T1059.006 | Python | APT37 has used Python scripts to execute payloads.7 |
enterprise | T1555 | Credentials from Password Stores | - |
enterprise | T1555.003 | Credentials from Web Browsers | APT37 has used a credential stealer known as ZUMKONG that can harvest usernames and passwords stored in browsers.1 |
enterprise | T1005 | Data from Local System | APT37 has collected data from victims’ local systems.1 |
enterprise | T1561 | Disk Wipe | - |
enterprise | T1561.002 | Disk Structure Wipe | APT37 has access to destructive malware that is capable of overwriting a machine’s Master Boot Record (MBR).13 |
enterprise | T1189 | Drive-by Compromise | APT37 has used strategic web compromises, particularly of South Korean websites, to distribute malware. The group has also used torrent file-sharing sites to more indiscriminately disseminate malware to victims. As part of their compromises, the group has used a Javascript based profiler called RICECURRY to profile a victim’s web browser and deliver malicious code accordingly.215 |
enterprise | T1203 | Exploitation for Client Execution | APT37 has used exploits for Flash Player (CVE-2016-4117, CVE-2018-4878), Word (CVE-2017-0199), Internet Explorer (CVE-2020-1380 and CVE-2020-26411), and Microsoft Edge (CVE-2021-26411) for execution.2135 |
enterprise | T1105 | Ingress Tool Transfer | APT37 has downloaded second stage malware from compromised websites.1657 |
enterprise | T1559 | Inter-Process Communication | - |
enterprise | T1559.002 | Dynamic Data Exchange | APT37 has used Windows DDE for execution of commands and a malicious VBS.2 |
enterprise | T1036 | Masquerading | - |
enterprise | T1036.001 | Invalid Code Signature | APT37 has signed its malware with an invalid digital certificates listed as “Tencent Technology (Shenzhen) Company Limited.”2 |
enterprise | T1106 | Native API | APT37 leverages the Windows API calls: VirtualAlloc(), WriteProcessMemory(), and CreateRemoteThread() for process injection.3 |
enterprise | T1027 | Obfuscated Files or Information | APT37 obfuscates strings and payloads.367 |
enterprise | T1027.003 | Steganography | APT37 uses steganography to send images to users that are embedded with shellcode.36 |
enterprise | T1120 | Peripheral Device Discovery | APT37 has a Bluetooth device harvester, which uses Windows Bluetooth APIs to find information on connected Bluetooth devices. 6 |
enterprise | T1566 | Phishing | - |
enterprise | T1566.001 | Spearphishing Attachment | APT37 delivers malware using spearphishing emails with malicious HWP attachments.136 |
enterprise | T1057 | Process Discovery | APT37‘s Freenki malware lists running processes using the Microsoft Windows API.3 |
enterprise | T1055 | Process Injection | APT37 injects its malware variant, ROKRAT, into the cmd.exe process.3 |
enterprise | T1053 | Scheduled Task/Job | - |
enterprise | T1053.005 | Scheduled Task | APT37 has created scheduled tasks to run malicious scripts on a compromised host.7 |
enterprise | T1082 | System Information Discovery | APT37 collects the computer name, the BIOS model, and execution path.3 |
enterprise | T1033 | System Owner/User Discovery | APT37 identifies the victim username.3 |
enterprise | T1529 | System Shutdown/Reboot | APT37 has used malware that will issue the command shutdown /r /t 1 to reboot a system after wiping its MBR.3 |
enterprise | T1204 | User Execution | - |
enterprise | T1204.002 | Malicious File | APT37 has sent spearphishing attachments attempting to get a user to open them.1 |
enterprise | T1102 | Web Service | - |
enterprise | T1102.002 | Bidirectional Communication | APT37 leverages social networking sites and cloud platforms (AOL, Twitter, Yandex, Mediafire, pCloud, Dropbox, and Box) for C2.13 |
Software
References
-
FireEye. (2018, February 20). APT37 (Reaper): The Overlooked North Korean Actor. Retrieved March 1, 2018. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
Raiu, C., and Ivanov, A. (2016, June 17). Operation Daybreak. Retrieved February 15, 2018. ↩↩↩↩↩↩
-
Mercer, W., Rascagneres, P. (2018, January 16). Korea In The Crosshairs. Retrieved May 21, 2018. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
CrowdStrike. (2021, September 30). Adversary Profile - Richochet Chollima. Retrieved September 30, 2021. ↩
-
Cash, D., Grunzweig, J., Meltzer, M., Adair, S., Lancaster, T. (2021, August 17). North Korean APT InkySquid Infects Victims Using Browser Exploits. Retrieved September 30, 2021. ↩↩↩↩↩↩
-
GReAT. (2019, May 13). ScarCruft continues to evolve, introduces Bluetooth harvester. Retrieved June 4, 2019. ↩↩↩↩↩↩↩↩
-
Cash, D., Grunzweig, J., Adair, S., Lancaster, T. (2021, August 25). North Korean BLUELIGHT Special: InkySquid Deploys RokRAT. Retrieved October 1, 2021. ↩↩↩↩↩
-
Grunzweig, J. (2018, October 01). NOKKI Almost Ties the Knot with DOGCALL: Reaper Group Uses New Malware to Deploy RAT. Retrieved November 5, 2018. ↩↩