My IBM Log in Subscribe

ITG10 likely targeting South Korean entities of interest to the Democratic People’s Republic of Korea (DPRK)

06 Jun 2023

7 min read

Author

Joshua Chung

Cyber Threat Intelligence Analyst

IBM Security

Melissa Frydrych-Dean

Threat Hunt Researcher

IBM

Claire Zaboeva

Senior Strategic Cyber Threat Analyst

IBM

Agnes Ramos-Beauchamp

Security Consultant

IBM

In late April 2023, IBM Security X-Force uncovered documents that are most likely part of a phishing campaign mimicking credible senders, orchestrated by a group X-Force refers to as ITG10, and aimed at delivering RokRAT malware, similar to what has been observed by others. ITG10’s tactics, techniques and procedures (TTPs) overlap with APT37 and ScarCruft. The initial delivery method is conducted via a LNK file, which drops two Windows shortcut files containing obfuscated PowerShell scripts in charge of downloading a second stage RokRAT shellcode. RokRAT can execute remote C2 commands, data exfiltration, file download/upload, and keylogging. The uncovered lure documents suggest ITG10 may be targeting individuals and organizations involved in foreign policy associated with the Korean peninsula.

Key Findings:

  • ITG10 likely targeting South Korean government, universities, think tanks, and dissidents
  • Phishing emails spoof legitimate senders to deliver RokRAT via LNK files
  • Email attachments mimic legitimate documents
  • Additional malware samples possibly related to ITG10 RokRAT campaigns

Decoy documents

In late April 2023, X-Force uncovered several Zip Archives files hosting multiple lure documents likely sent via phishing campaigns operated by ITG10. X-Force assesses that the documents are likely decoys geared toward various personnel within two subsets of activity: South Korean government, communication, and educational centers; and energy, manufacturing, and supply chain. This section provides analysis of the lure documents and potential targets.

The latest tech news, backed by expert insights

Stay up to date on the most important—and intriguing—industry trends on AI, automation, data and beyond with the Think newsletter. See the IBM Privacy Statement.

Thank you! You are subscribed.

Your subscription will be delivered in English. You will find an unsubscribe link in every newsletter. You can manage your subscriptions or unsubscribe here. Refer to our IBM Privacy Statement for more information.

South Korean government, communications and educational centers

The first suspected subset of activity revealed Korean-language lure documents. The first titled (0722)상임위원회 및 상설특별위원회 위원 명단(최종).zip [(0722) List of Standing Committee and Standing Special Committee members (final).zip)], contains charts listing the Standing Committee members and assignments associated with broadcast media in South Korea as of July 2022. Examination of the contents suggests that it is a directory of eighteen South Korean parliamentary committee assignments, the number of committee members, their names, and political party affiliation. Committees include Education and Judicial, International and Foreign Affairs, Defense, and Intelligence. The intended targets for this lure are likely to be parliamentary members seeking information on their committee assignment or reporters covering parliament.

(0722)상임위원회 및 상설특별위원회 위원 명단(최종).zip

An additional decoy document titled 계약서내용.pdf (Contract detail.pdf) appears to be associated with a national South Korean broadcaster. The contents detail the company’s approach to radio drama production scheduled for broadcast in May 2023. North Korean sponsored threat actors have previously been known to create accounts posing as broadcasting scriptwriters to deceive watchers. In 2021, North Korean threat actors compromised several email accounts of prominent defectors to send malicious documents to contacts working on DPRK issues. ITG10 has also been known to infect news websites with malware likely to spy on readers.

A third decoy 2023년도 4월 29일 세미나.pdf (April 29, 2023 Seminar.pdf) appears to be an itinerary for an event hosted in April 2023 by a South Korean think tank. The event includes multiple seminars on political theory, military history, and a talk on “Intelligence activities and cyber security of the National Intelligence Service.” Members of this think tank include professors from multiple universities and South Korean government entities. There are two mobile phone numbers and a Zoom link with a password in the decoy document, which can be scraped to launch phishing material over social medial platforms. Based on the document’s content, academic and government employees, especially those in intelligence and cybersecurity, are probable targets for phishing emails containing this type of decoy document.

2023년도 4월 29일 세미나.pdf

Energy, manufacturing and supply chain

The second grouping of lure documents features a zip file projects in Libya.zip containing a LNK file Pipelines Profile (Elfeel- Sharara-Mellitah + Wafa – Mellitah).lnk, as well as additional English-language decoy files. The decoy files are a Microsoft Word Document and PDF copy of a document titled Proposed MOU GTE Korea. The documents appear to be legitimate and establish a written Memorandum of Understanding (MOU) between an authentic privately owned Libyan energy company and a South Korean consulting firm specializing in energy, procurement, construction and finance (EPC&F). In addition, the zip contains a second non-malicious lure PDF titled MFZ Executive Summary Korea detailing a feasibility study regarding the development and expansion of the “sea port free zone of Misurata.”

Based on the decoy content, the likely recipients of this phishing campaign would be organizations or individuals involved with a construction project in the Middle East. The Middle East has been a traditional customer for many large-scale construction projects for multiple South Korean companies, and there has been a recent push by the South Korean administration to what’s known as the ‘2nd construction boom. These construction projects are part of the South Korean government’s pivot to the Middle East, deepening ties both militarily and economically.

Sample analysis

RokRAT has been previously analyzed as having a multi-stage process with two components. The first involves tooling, and the second involves the payload, likely to inhibit researchers from analyzing the final payload, while maintaining the ability to stop delivery once a target system is infected. RokRAT campaigns typically begin with a phishing email with a ZIP file attachment, containing a LNK file disguised as a Word document. When the LNK file is activated, a PowerShell script is executed, opening a decoy document to start the download process of RokRAT which is hosted at OneDrive or similar cloud application. In another campaign, ITG10 was observed delivering RokRAT via HWP and Word files containing LNK files. In X-Force’s analysis of recent RokRAT-related files, in lieu of a ZIP file, we found Optical Disc Image files (ISO) containing LNK files that had slightly modified PowerShell scripts, and Hangul Word Processor decoy documents (HWP).

 ISO files

The ISO files that X-Force observed contained a LNK file disguised as an exe icon, subsequently containing a HWP file, and a batch file. The LNK file contains a PowerShell command, as seen below as an example. Once the LNK file is executed, it extracts and drops a decoy file, and a batch file within the user’s %TEMP% folder. In this instance, the files were 2023년도 4월 29일 세미나.pdf – decoy file, and 230415.bat.

icon_location = C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

PowerShell Commands:

Related malware?

While researching the RokRAT-related files, X-Force also uncovered three LNK files that behave differently than expected. There is no use of OneDrive or similar cloud applications to host a second-stage payload, and instead of dropping a batch file, these LNK files drop VBS, with the obfuscation technique for the dropped files being hex-encoding vs. string concatenation. In addition, the RokRAT LNK files drop batch files and downloads the payload that is decoded using the first byte as a key, then the payload is executed using Windows API functions (VirtualProtect). With these additional LNK files, the VBS downloaders do not perform these actions.

The LNK files analyzed contain an encoded PowerShell, and once the LNK files are executed, the PowerShell script is run, and two files are dropped to the user’s %TEMP% folder. In one analyzed sample, the files dropped were a VBS file (tmp<random-9-digit-number>.vbs ), and a Plaintext file with contents asdfgqwert. The VBS file will get executed via Wscript.exe:

“C:\Windows\System32\WScript.exe” “C:\Users\Usuario\AppData\Local\Temp\tmp<nine-digit-number>.vbs”. Wscript.exe is a service 

Wscript.exe is a service provided by the Windows system with scripting abilities. Subsequently, two GET requests are initiated. In a third file we analyzed, instead of the LNK file dropping a VBS and a Plaintext file, a VBS file and a JPEG decoy file are dropped to the users %TEMPT% folder. In this case, the JPEG decoy file appears to be a correspondence related to the “Proof of Digital Assets”. At the time of this analysis, X-Force was unable to retrieve the final payload from the servers as they have been taken down; therefore, it is uncertain whether these additional LNK files are related to ITG10 activity. Further research and analysis are needed to determine relevance and attribution.

Encoded PowerShell:

Decoded PowerShell:

tmp1698268529.vbs

GET requests:

Proof of digital assets JPEG

X-Force recommendations

Multiple lure documents uncovered in this campaign suggest ITG10 continues to target individuals and organizations involved in foreign policy, potentially related to shifts in the geopolitical and security environment on the Korean peninsula. IBM X-Force assesses with high confidence that individuals and organizations holding strategic, political, or military information in connection with the Korean peninsula will see elevated threats from the DPRK, given ITG10’s previous and recent activity.

Organizations that may be at elevated risk of targeting from ITG10 have the potential to decrease the risk to their organization by employing heightened vigilance toward potential phishing emails, warning employees of the phishing email threats, employing and closely monitoring endpoint detection and response (EDR) tools, and leveraging behavioral analytics to identify malicious behavior. We also recommend that potentially targeted organizations alert on the following indicators of compromise to detect behavior related to this campaign.

Mixture of Experts | 2 May, episode 53

Decoding AI: Weekly News Roundup

Join our world-class panel of engineers, researchers, product leaders and more as they cut through the AI noise to bring you the latest in AI news and insights.

Indicators of compromise

IndicatorIndicator TypeContext
f92297c4efabba98befeb992a009462d1aba6f3c3a11210a7
c054ff5377f0753
LNK 
7ef2c0d2ace70fedfe5cd919ad3959c56e7e9177dcc0ee770
a4af7f84da544f1
PDF Decoy2023년도 4월 29일 세미나.pdf
06431a5d8f6262cc3db39d911a920f793fa6c648be94daf7
89c11cc5514d0c3d
Batch File230415.bat
1c5b9409243bfb81a5924881cc05f63a301a3a7ce214830c7
a83aeb2485cc5c3
ZIP(0722)상임위원회 및 상설특별위원회 위원 명단(최종).zip
cb4c7037c7620e4ce3f8f43161b0ec67018c09e71ae4cea
3018104153fbed286
LNK 
5815a6f7976e993fcdf9e024f4667049ec5a921b7b93c8c
8c0e5d779c8b72fcc
HWP Decoy0722.hwp
240e7bd805bd7f2d17217dd4cebc03ac37ee60b7fb126
4655cfd087749db647a
Batch File202207221.bat
9854750f3880c7cee3281d8c33292ca82d0d288963f0f
2771d938c06ccaffaa9
LNK 
ce56b011ac4663a40f0ba606c98c08aaf7caf6a45765aa
930258fe2837b12181
PDF Decoy계약서내용.pdf
cc6ae9670e38244e439711b1698f0db3cff000b79bec7
f47bc4aa5ab1f6177c0
Batch File230422.bat
00d88009fa50bfab849593291cce20f8b2f2e2cf2428
d9728e06c69fced55ed5
ZIPprojects in Libya.zip
6753933cd54e4eba497c48d63c7418a8946b4b6c441701
05d489d29f1fe11494
LNKPipelines Profile (Elfeel- Sharara-Mellitah + Wafa – Mellitah).lnk
f1289e7229ace984027f29cf8e2dd8fdd19b0c4b488da3
1ff411ee95305eaecc
docxProposed MOU GTE Korea.docx
fa2ebcdfce8bbe4245ed77b43d39e22c0c7593ca3f65b
e3fd0ccdf7ee02130a9
PDF DecoyProposed MOU GTE Korea.pdf
76d0133d738876f314ae792d0cf949710b66266ba0cebe
fbd98ce40c64a9b15b
PDF DecoyMFZ Executive Summary Korea.pdf
5678196f512f8a531c7d85af8df4f40c7a5f9c27331b361b
b1a1c46d317a77d8
PDF Decoy230130.pdf
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe Icon Location
C:\Program Files (x86)\Hnc\Office 2020\HOffice110\Bin\Hwp.exe Icon Location
hxxps[:]//api.onedrive[.]com/v1.0/shares/u!zHR0cHM6Ly8
xZHJ2Lm1zL3UvcyFBalFOTHZFRV9DVU9iUFdnLXhPZG8x
RXFYckU_ZT1BM1QwV2Q/root/content
URLDocument Location
hxxps[:]//api.onedrive[.]com/v1.0/shares/u!aHR0cHM6L
y8xZHJ2Lm1zL2kvcyFBaFhFWExKU05NUFRlNnFWazdD
NHp2Yy1SekU_ZT1SSFZJSk4/root/content
URLDocument Location
hxxps[:]//api.onedrive[.]com/v1.0/shares/u!aHR0cH
M6Ly8xZHJ2Lm1zL3UvcyFBaFFNUDZlZzhhUkZiN0xV
MUNPQ2YzeE5vVFU_ZT1wZ2liaUM/root/content
URLDocument Location
hxxps[:]//api.onedrive[.]com/v1.0/shares/u!aHR0cHM
6Ly8xZHJ2Lm1zL2kvcyFBaFhFWExKU05NUFRiZnpnVU
14TmJJbkM2Q0k_ZT1WZElLSjE/root/content
URLDocument Location
hxxps[:]//api.onedrive[.]com/v1.0/shares/u!aHR0cHM
6Ly8xZHJ2Lm1zL3UvcyFBdTJteTF4aDZ0OFhnUjJNem
1zOG5oUndvLTZCP2U9akhIQzZ5/root/content
URLDocument Location
6bab11d9561482777757f16c069ebef3f1cd6885dbef5530
6ffde30037a41d48
LNK 
7529eaeeb29c713f8e15827c79001a9227d8bc31c9209b
f524a4ff91648a526e
VBS 
xn--vn4b27hka971hbue[.]kr C2GET Request
50fe8a981a7d4824f0b297f37804b65672ed4484e198e7c
324260a34941ddac7
LNK 
3d1d2d0464013d9e1dd7611d73176f3a31328a41d6474d
5b6d0582ad09d3b17d
VBS 
partybbq.co[.]kr C2GET Request
1ec4d60738a671f00089a86eeba6cb13750bce589e84f
d177707718a4cc7d8f1
LNK 
88c219656f853b2dc54ae02d32a716e10c8392ed471d1c
813e57de2dc170951e
VBS 
7aa7233feb8e8a7b71ae6cdd0ddb8c2b192d4b6e131fe
d1ade82efdcb8096c57
JPEGDecoy
To learn how IBM X-Force can help you with anything regarding cybersecurity including incident response, threat intelligence, or offensive security services schedule a meeting here:

IBM X-Force Scheduler

If you are experiencing cybersecurity issues or an incident, contact X-Force to help:

US hotline 1-888-241-9812 | Global hotline (+001) 312-212-8034