South Korean Organizations Targeted by Cobalt Strike 'Cat' Delivered by a Rust Beacon
March 19, 2025, 9:34 a.m.
Description
An exposed web server containing tools for an intrusion campaign targeting South Korean organizations was identified. The server hosted a Rust-compiled Windows executable delivering Cobalt Strike Cat, along with SQLMap, Web-SurvivalScan, and dirsearch. The threat actor used these tools to identify and exploit vulnerable web applications, targeting government and commercial entities. The campaign utilized a Rust-compiled loader with a modified version of Cobalt Strike, providing insight into the actor's malware delivery and post-exploitation techniques. Analysis revealed reconnaissance tools, SQL injection exploitation, and malware delivery components, with logs confirming beacon activity from compromised hosts. The attackers used MinGW- and Rust-compiled loaders to deploy Cobalt Strike Cat and Marte shellcode.
Tags
Date
- Created: March 18, 2025, 8:59 p.m.
- Published: March 18, 2025, 8:59 p.m.
- Modified: March 19, 2025, 9:34 a.m.
Indicators
- f635f424b967e3df6bec0e6bd4643d5b19bb6e3e3d9c925d91124b80f85e8d1b
- cb884be5f579e4e4917de5d9ae0a9cd3d9c80397b9a1519a8bb1fd5eeb6b882b
- bbb6542d8602dfe0b66073266a3606e6804f5b2c67d64266b0ef245220ccc3cc
- 97536e893cbd37b535911d36b284de01325f3a6cd7213e4e82536cef1d85c3aa
- 8212f3c18f5c875e5543e08389798edb8cdace8446211cedb0baee70e0e37d97
- 4b00b7ef72db51bd3c40366e283fc4eed7d613b410fdebaf451bf926fdd427fd
- 36ca817200204eae59263031e64971e18a8f1d187c81e858d21e4567885e3040
- 144.48.4.219
- 104.167.222.106
Additional Informations
- Government