RedEyes-Hacker stehlen mit neuer Malware Daten von Windows- und Mobiltelefonen

Teilen:

The APT37 threat group uses a new evasive ‘M2RAT’ malware and steganography to target individuals for intelligence collection.

APT37, also known as ‘RedEyes’ or ‘ScarCruft,’ is a North Korean cyber espionage hacking group believed to be state-supported.

In 2022, the hacking group was seen exploiting Internet Explorer zero-days and distributing a wide assortment of malware against targeted entities and individuals.

For example, the threat actors targeted EU-based organizations with a new version of their mobile backdoor named ‘Dolphin,’ deployed a custom RAT (remote access trojan) called ‘Konni,’ and targeted U.S. journalists with a highly-customizable malware named ‘Goldbackdoor.’

In einem new report released today by AhnLab Security Emergency response Center (ASEC), researchers explain how APT37 is now using a new malware strain called ‘M2RAT’ that uses a shared memory section for commands and data exfiltration and leaves very few operational traces on the infected machine.

Starts with phishing

The recent attacks observed by ASEC started in January 2023, when the hacking group sent phishing emails containing a malicious attachment to their targets.

Opening the attachment triggers the exploitation of an old EPS vulnerability (CVE-2017-8291) in the Hangul word processor commonly used in South Korea. The exploit will cause shellcode to run on a victim’s computer that downloads and executes a malicious executed stored within a JPEG image.

This JPG image file uses steganography, a technique that allows hiding code inside files, to stealthily introduce the M2RAT executable (“lskdjfei.exe”) onto the system and inject it into “explorer.exe.”

For persistence on the system, the malware adds a new value (“RyPO”) in the “Run” Registry key, with commands to execute a PowerShell script via “cmd.exe.” This same command was also seen in a 2021 Kaspersky report about APT37.

M2RAT steals from Windows and phones

The M2RAT backdoor acts as a basic remote access trojan that performs keylogging, data theft, command execution, and the taking of screenshots from the desktop.

The screenshot-snapping function is activated periodically and works autonomously without requiring a specific operator command.

The malware supports the following commands, which collect information from the infected device and then send it back to the C2 server for the attackers to review.

The malware’s ability to scan for portable devices connected to the Windows computer, such as smartphones or tablets, is particularly interesting.

If a portable device is detected, it will scan the device’s contents for documents and voice recording files and, if found, copy them to the PC for exfiltration to the attacker’s server.

Before exfiltration, the stolen data is compressed in a password-protected RAR archive, and the local copy is wiped from memory to eliminate any traces.

Another interesting feature of M2RAT is that it uses a shared memory section for command and control (C2) communication, data exfiltration, and the direct transfer of stolen data to the C2 without storing them in the compromised system.

Using a memory section on the host for the above functions minimizes the exchange with the C2 and makes analysis harder, as security researchers have to analyze the memory of infected devices to retrieve the commands and data used by the malware.

In conclusion, APT37 continues to refresh its custom toolset with evasive malware that is challenging to detect and analyze.

This is especially true when the targets are individuals, like in the recent campaign spotted by ASEC, who lack larger organizations’ sophisticated threat detection tools.

 

(c)  Bill Toulas

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
8:52 pm, Juli 11, 2025
Wetter-Symbol 26°C
L: 26° | H: 28°
klarer Himmel
Luftfeuchtigkeit: 51 %
Druck: 1018 mb
Wind: 11 mph E
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 2%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:56 am
Sonnenuntergang: 9:15 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
26° | 28°°C 0 mm 0% 6 mph 51 % 1018 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
17° | 29°°C 0 mm 0% 10 mph 65 % 1018 mb 0 mm/h
So. Juli 13 10:00 pm
Wetter-Symbol
17° | 29°°C 0 mm 0% 7 mph 66 % 1015 mb 0 mm/h
Mo. Juli 14 10:00 pm
Wetter-Symbol
19° | 28°°C 0 mm 0% 14 mph 71 % 1017 mb 0 mm/h
Di. Juli 15 10:00 pm
Wetter-Symbol
15° | 25°°C 0 mm 0% 13 mph 68 % 1020 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
24° | 26°°C 0 mm 0% 6 mph 51 % 1018 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
20° | 24°°C 0 mm 0% 3 mph 52 % 1018 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
17° | 20°°C 0 mm 0% 4 mph 58 % 1018 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
19° | 19°°C 0 mm 0% 5 mph 65 % 1018 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
26° | 26°°C 0 mm 0% 6 mph 44 % 1017 mb 0 mm/h
Tomorrow 1:00 pm
Wetter-Symbol
29° | 29°°C 0 mm 0% 6 mph 32 % 1016 mb 0 mm/h
Tomorrow 4:00 pm
Wetter-Symbol
29° | 29°°C 0 mm 0% 10 mph 30 % 1014 mb 0 mm/h
Tomorrow 7:00 pm
Wetter-Symbol
25° | 25°°C 0 mm 0% 9 mph 41 % 1014 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€100,882.38
4.11%
Ethereum(ETH)
€2,565.40
6.58%
XRP(XRP)
€2.42
13.38%
Fesseln(USDT)
€0.86
-0.02%
Solana(SOL)
€140.46
3.22%
USDC(USDC)
€0.86
0.01%
Dogecoin(DOGE)
€0.180060
13.40%
Shiba Inu(SHIB)
€0.000012
7.68%
Pepe(PEPE)
€0.000011
11.80%
Peanut das Eichhörnchen(PNUT)
€0.246339
4.77%
Nach oben scrollen