lazarusholic

Everyday is lazarus.dayβ

North Korea-Linked Konni APT Group – Active IOCs

2025-04-03, Rewterz
https://rewterz.com/threat-advisory/north-korea-linked-konni-apt-group-active-iocs-14
#Konni

Contents

Rhadamanthys Stealer – Active IOCs
April 3, 2025Multiple Cisco Products Vulnerabilities
April 3, 2025Rhadamanthys Stealer – Active IOCs
April 3, 2025Multiple Cisco Products Vulnerabilities
April 3, 2025Severity
High
Analysis Summary
The Konni APT (Advanced Persistent Threat) group has been a cyber espionage group since at least 2014. It is believed to be based in North Korea and is known for targeting government agencies and organizations in South Korea and the United States.
The North Korean hacker group distributes Konni RAT via phishing messages or emails. The infection chain begins when the victim accesses a weaponized file. Adversaries employ Konni RAT to gather information from victims, capture screenshots, steal files, and build a remote interactive shell. KONNI has been linked to various alleged North Korean attacks targeting political groups in Russia, East Asia, Europe, and the Middle East. KONNI shares a significant code overlap with the NOKKI malware family. Konni's APT Group continues to attack malicious documents written in …

IoC

185.231.154.22
192.109.119.113
93.183.93.185
62.113.118.157
94.103.87.212
d5669c046c78f54d2acb353626bb3bcf
29b0a6b9608540b9446c0fb14a36f0b0
456987068ff42f8db6ff8e3af8b82e785b010c7f
3872ff7378ab6b155c9af26285f1a9ff9d496f76
d0544a045aae0e316380b57a7319ec54f7f0979a7882f33a15839311c7e29888
e9239ba649aec746e3c0088bc56400460b4a03e5f2df132ec7e47c14ccb70c0c
e25c696a6d4b6eafde43f2d6b8db45701cafc329df111ec48d63c5d0fb80f80c
f61032939e029de3dd03c223c8bcb384a9237f50
ec6842538f6166462d498279b8a462b3