Darkhotel

Darkhotel is a suspected South Korean threat group that has targeted victims primarily in East Asia since at least 2004. The group's name is based on cyber espionage operations conducted via hotel Internet networks against traveling executives and other select guests. Darkhotel has also conducted spearphishing campaigns and infected victims through peer-to-peer and file sharing networks.[1][2][3]

ID: G0012
Associated Groups: DUBNIUM, Zigzag Hail
Contributors: Harry Kim, CODEMIZE
Version: 3.0
Created: 31 May 2017
Last Modified: 08 January 2024

Associated Group Descriptions

Name Description
DUBNIUM

[3][4][5][6]

Zigzag Hail

[7]

Techniques Used

Domain ID Name Use
Enterprise T1036 .005 伪装: Match Legitimate Name or Location

Darkhotel has used malware that is disguised as a Secure Shell (SSH) tool.[4]

Enterprise T1573 .001 加密通道: Symmetric Cryptography

Darkhotel has used AES-256 and 3DES for C2 communications.[6]

Enterprise T1140 反混淆/解码文件或信息

Darkhotel has decrypted strings and imports using RC4 during execution.[2][6]

Enterprise T1547 .001 启动或登录自动启动执行: Registry Run Keys / Startup Folder

Darkhotel has been known to establish persistence by adding programs to the Run Registry key.[1]

Enterprise T1059 .003 命令与脚本解释器: Windows Command Shell

Darkhotel has dropped an mspaint.lnk shortcut to disk which launches a shell script that downloads and executes a file.[2]

Enterprise T1203 客户端执行漏洞利用

Darkhotel has exploited Adobe Flash vulnerability CVE-2015-8651 for execution.[4]

Enterprise T1083 文件和目录发现

Darkhotel has used malware that searched for files with specific patterns.[6]

Enterprise T1080 污染共享内容

Darkhotel used a virus that propagates by infecting executables stored on shared drives.[1]

Enterprise T1189 浏览器攻击

Darkhotel used embedded iframes on hotel login portals to redirect selected victims to download malware.[1]

Enterprise T1027 .013 混淆文件或信息: Encrypted/Encoded File

Darkhotel has obfuscated code using RC4, XOR, and RSA.[2][6]

Enterprise T1204 .002 用户执行: Malicious File

Darkhotel has sent spearphishing emails in an attempt to lure users into clicking on a malicious attachments.[2][6]

Enterprise T1082 系统信息发现

Darkhotel has collected the hostname, OS version, service pack version, and the processor architecture from the victim’s machine.[2][6]

Enterprise T1124 系统时间发现

Darkhotel malware can obtain system time from a compromised host.[8]

Enterprise T1016 系统网络配置发现

Darkhotel has collected the IP address and network adapter information from the victim’s machine.[2][6]

Enterprise T1497 虚拟化/沙盒规避

Darkhotel malware has employed just-in-time decryption of strings to evade sandbox detection.[8]

.001 System Checks

Darkhotel malware has used a series of checks to determine if it's being analyzed; checks include the length of executable names, if a filename ends with .Md5.exe, and if the program is executed from the root of the C:\ drive, as well as checks for sandbox-related libraries.[8][4]

.002 User Activity Based Checks

Darkhotel has used malware that repeatedly checks the mouse cursor position to determine if a real user is on the system.[8]

Enterprise T1518 .001 软件发现: Security Software Discovery

Darkhotel has searched for anti-malware strings and anti-virus processes running on the system.[2][4]

Enterprise T1105 输入工具传输

Darkhotel has used first-stage payloads that download additional malware from C2 servers.[4]

Enterprise T1056 .001 输入捕获: Keylogging

Darkhotel has used a keylogger.[1]

Enterprise T1057 进程发现

Darkhotel malware can collect a list of running processes on a system.[2]

Enterprise T1091 通过可移动媒体复制

Darkhotel's selective infector modifies executables stored on removable media as a method of spreading across computers.[1]

Enterprise T1566 .001 钓鱼: Spearphishing Attachment

Darkhotel has sent spearphishing emails with malicious RAR and .LNK attachments.[2][6]

Enterprise T1553 .002 颠覆信任控制: Code Signing

Darkhotel has used code-signing certificates on its malware that are either forged due to weak keys or stolen. Darkhotel has also stolen certificates and signed backdoors and downloaders with them.[1][2]

References