South Korean Organizations Targeted by Cobalt Strike 'Cat' Delivered by a Rust Beacon

March 19, 2025, 9:34 a.m.

Description

An exposed web server containing tools for an intrusion campaign targeting South Korean organizations was identified. The server hosted a Rust-compiled Windows executable delivering Cobalt Strike Cat, along with SQLMap, Web-SurvivalScan, and dirsearch. The threat actor used these tools to identify and exploit vulnerable web applications, targeting government and commercial entities. The campaign utilized a Rust-compiled loader with a modified version of Cobalt Strike, providing insight into the actor's malware delivery and post-exploitation techniques. Analysis revealed reconnaissance tools, SQL injection exploitation, and malware delivery components, with logs confirming beacon activity from compromised hosts. The attackers used MinGW- and Rust-compiled loaders to deploy Cobalt Strike Cat and Marte shellcode.

Date

  • Created: March 18, 2025, 8:59 p.m.
  • Published: March 18, 2025, 8:59 p.m.
  • Modified: March 19, 2025, 9:34 a.m.

Indicators

  • f635f424b967e3df6bec0e6bd4643d5b19bb6e3e3d9c925d91124b80f85e8d1b
  • cb884be5f579e4e4917de5d9ae0a9cd3d9c80397b9a1519a8bb1fd5eeb6b882b
  • bbb6542d8602dfe0b66073266a3606e6804f5b2c67d64266b0ef245220ccc3cc
  • 97536e893cbd37b535911d36b284de01325f3a6cd7213e4e82536cef1d85c3aa
  • 8212f3c18f5c875e5543e08389798edb8cdace8446211cedb0baee70e0e37d97
  • 4b00b7ef72db51bd3c40366e283fc4eed7d613b410fdebaf451bf926fdd427fd
  • 36ca817200204eae59263031e64971e18a8f1d187c81e858d21e4567885e3040
  • 144.48.4.219
  • 104.167.222.106

Attack Patterns

Additional Informations

  • Government