Analysis of APT-C-55 (Kimsuky) Organization's HappyDoor Backdoor Attack Based on VMP Strong Shell
July 13, 2025, 11:40 a.m.
Description
The APT-C-55 (Kimsuky) group, a North Korean threat actor, has launched a new attack campaign targeting South Korea. They used a disguised Bandizip installation package to deliver malicious code and a VMP-protected HappyDoor trojan for espionage activities. The attack involves remote script loading, multi-stage malware deployment, and information theft. The malware collects sensitive data, including user information, system details, and files from specific directories. It also implements keylogging, screen capture, and mobile device monitoring functionalities. The attack methodology and infrastructure align with Kimsuky's historical patterns, including the use of similar scripts, backdoor families, and domain naming conventions.
Tags
Date
- Created: July 10, 2025, 6:41 p.m.
- Published: July 10, 2025, 6:41 p.m.
- Modified: July 13, 2025, 11:40 a.m.
Indicators
- d75eae7a38df433a4ac5faca0c70a1634729d884e45d14d306b2078fe0a8e5af
- 5f23b1ca43f6a18e3c9f21d390f5d1e187b1339b07a1dce70f8338f3be320878
- 67.217.62.222
- u.appw.p-e.kr
- mrasis.n-e.kr
- d.appz.p-e.kr
Additional Informations
- Media
- Education
- Government
- Korea, Republic of