The infamous Lazarus group has been recognized as leveraging compromised IIS servers to deploy malicious ASP net shells.
These subtle assaults have been reported to facilitate the unfold of malware, together with the LazarLoader variant, and make the most of privilege escalation instruments to achieve intensive management over contaminated programs.
The Lazarus group, related to North Korean actors, has been energetic in orchestrating high-profile cyber operations, starting from monetary heists to espionage missions.
Their techniques typically contain exploiting vulnerabilities in net servers and leveraging net shells to handle their command and management (C2) infrastructure.
Latest Assault Strategies
Latest studies from AhnLab Safety Intelligence Heart (ASEC) spotlight the Lazarus group’s newest techniques involving IIS servers.
These servers, particularly focusing on South Korean entities, are used as first-stage C2 servers, performing as proxies to mediate communication between malware and secondary C2 servers.
This strategic setup permits the group to keep up stealth and longevity of their operations.
C2 Script Evaluation
The newly recognized C2 script, whereas differing from previous variants, maintains an identical function—working as a proxy to handle communication throughout completely different phases of the assault.


Notable enhancements embrace assist for each kind information and cookie information throughout communication. The script handles varied instructions:
- Kind Mode:
- MidRequest: Redirect information
- ProxyCheck: Save mid data
- ReadFile, WriteFile: Manipulate recordsdata
- ClientHello: Reply with mid data and write proxy log
- ProxyLog: Reply with proxy log
- CheckFileTransfer: Lookup file
- Cookie Technique:
- Related instructions are supported, with MidRequest, ReadFile, WriteFile, and ClientHello
Internet Shell Evaluation
Along with C2 scripts, the Lazarus group has utilized net shells just like the RedHat Hacker net shell.


The net shells, present in recordsdata reminiscent of function2.asp, are encrypted and require a password for entry, which was just lately recognized as 2345rdx.
These shells present intensive functionalities, together with file administration, course of execution, and SQL queries.
Different net shells named file_uploader_ok.asp and find_pwd.asp have been additionally recognized, providing related capabilities whereas utilizing completely different encryption keys for packet decryption.
LazarLoader and Privilege Escalation
LazarLoader, a malware loader, has been noticed along with these net shells. It downloads, decrypts, and executes payloads from exterior sources.


In current assaults, LazarLoader was used to load extra malware, leveraging a hardcoded deal with for payload obtain and a selected key for decryption.
Alongside LazarLoader, a privilege escalation instrument was recognized, using UAC bypass strategies via ComputerDefaults.exe or fodhelper.exe to execute malware with elevated privileges.
Influence and Suggestions
The Lazarus group’s capability to weaponize IIS servers and exploit vulnerabilities underscores the significance of strong safety measures for net servers. Listed below are key suggestions:
- Common Safety Audits: Conduct frequent audits to detect any unauthorized entry or modifications in server configurations.
- Robust Authentication: Guarantee robust passwords are used for all net associated entry factors, and think about multi-factor authentication.
- Up-to-Date Software program: Maintain working programs, net servers, and safety software program up to date to stop exploitation of recognized vulnerabilities.
- Monitor Community Site visitors: Implement monitoring instruments to detect suspicious communication patterns indicative of C2 exercise.
In conclusion, the Lazarus group’s evolving techniques spotlight the necessity for vigilance and proactive protection methods in opposition to such subtle threats.
As cyber adversaries proceed to innovate, staying knowledgeable concerning the newest assault strategies is essential for efficient cybersecurity.
For organizations involved about these threats, the next actions are really useful:
- Overview Server Configurations to make sure they don’t seem to be uncovered to pointless vulnerabilities.
- Implement Enhanced Monitoring instruments to catch anomalies in real-time.
- Prepare Personnel on recognizing and responding to potential safety incidents.
By taking these proactive steps, organizations can considerably scale back their publicity to the continuing threats posed by the Lazarus group and related cyber actors.
Are you from SOC/DFIR Groups? – Analyse Malware Incidents & get stay Entry with ANY.RUN -> Begin Now for Free.