Skip to main content

Case of Larva-25004 Group (Related to Kimsuky) Exploiting Additional Certificate - Malware Signed with Nexaweb Certificate

Medium
Published: Fri May 23 2025 (05/23/2025, 20:17:29 UTC)
Source: AlienVault OTX General

Description

AhnLab Security Intelligence Center discovered malware signed with Nexaweb Inc.'s certificate, linked to the Kimsuky group's activities. The malware, tracked as Larva-25004, was found in two files signed on May 24 and 28, 2024. When executed, it displays a PDF file related to employment as bait, likely targeting individuals interested in defense company jobs. The certificate's authenticity is still under investigation. The malware's characteristics match those of files signed with a Korean company's certificate, previously reported in connection with Kimsuky. This incident highlights the ongoing threat of certificate exploitation by sophisticated threat actors.

AI-Powered Analysis

AILast updated: 06/22/2025, 22:19:38 UTC

Technical Analysis

The Larva-25004 malware campaign, attributed to the Kimsuky threat group, represents a sophisticated case of digital certificate exploitation involving the misuse of a legitimate certificate issued to Nexaweb Inc., a Korean software company. Discovered by the AhnLab Security Intelligence Center, the malware samples were signed on May 24 and 28, 2024, and employ social engineering by displaying a PDF document related to employment opportunities as bait. This lure specifically targets individuals interested in defense sector jobs, aiming to entice them into executing the malware. The use of a legitimate Nexaweb certificate enhances the malware's credibility and helps it evade detection by security solutions that trust signed executables. Although the authenticity of the certificate is under investigation, the malware's characteristics align with previous Kimsuky operations that exploited certificates from Korean companies. The malware incorporates multiple tactics and techniques identified by MITRE ATT&CK, including scheduled task execution (T1053.005), input capture (T1056.001), user execution (T1204.002), spearphishing attachment (T1566.001), masquerading (T1036.002), obfuscated files or information (T1027), command and scripting interpreter (T1059.003), and compromised certificate use (T1588.003). Indicators of compromise include multiple file hashes associated with the malware samples. No known exploits in the wild have been reported yet, and the threat is currently assessed as medium severity. This incident highlights the ongoing threat posed by advanced persistent threat (APT) actors who leverage stolen or compromised certificates to bypass security controls and infiltrate targeted networks stealthily.

Potential Impact

For European organizations, particularly those in the defense, aerospace, and critical infrastructure sectors, the Larva-25004 malware poses a significant espionage and operational risk. The malware’s use of employment-related bait suggests a spear-phishing vector aimed at individuals with access to sensitive information or systems, increasing the likelihood of targeted compromise. Successful execution could enable unauthorized access, data exfiltration, and lateral movement within networks, potentially compromising confidential defense projects, strategic technologies, or intellectual property. The exploitation of a legitimate certificate complicates detection and increases the chance of successful infiltration and prolonged undetected presence. European defense contractors, research institutions, and organizations collaborating with Korean or allied defense entities may be particularly vulnerable. Although the malware does not currently appear to cause immediate disruption, its stealth and targeted nature could lead to significant intelligence losses and operational impacts over time, undermining national security interests and industrial competitiveness.

Mitigation Recommendations

1. Enforce strict certificate validation policies, including real-time certificate revocation checks via CRL and OCSP, to detect and block binaries signed with compromised or unauthorized certificates. 2. Implement application whitelisting that evaluates not only the presence of a valid signature but also the reputation and trustworthiness of the certificate issuer and signer, incorporating threat intelligence on known malicious certificates. 3. Enhance email security by deploying advanced attachment sandboxing and heuristic analysis focused on employment-related documents, especially those from external or unverified sources. 4. Conduct targeted user awareness training emphasizing spear-phishing tactics involving recruitment lures, teaching users to verify unexpected job-related communications through independent channels. 5. Monitor endpoint and network activity for anomalous behaviors such as unusual scheduled tasks, input capture attempts, or command interpreter usage indicative of malware execution. 6. Integrate threat intelligence feeds containing indicators of compromise, including the provided file hashes, into security monitoring and incident response workflows for rapid detection and containment. 7. Collaborate with certificate authorities and software vendors to promptly revoke and replace compromised certificates and notify affected organizations. 8. For organizations with defense sector exposure, deploy enhanced logging, anomaly detection, and endpoint detection and response (EDR) solutions tailored to identify lateral movement, credential misuse, and other APT behaviors associated with Kimsuky. 9. Regularly audit and restrict permissions related to certificate management and software signing within the organization to prevent unauthorized certificate use.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://asec.ahnlab.com/en/88132"]
Adversary
Larva-25004
Pulse Id
6830d7d91482affcc8045e98

Indicators of Compromise

Hash

ValueDescriptionCopy
hash0315e137a6e2d658f07af454c63a0af2
hash27d4ff7439694041ef86233c2b804e1f
hash28ce4d33e7994c2be95816eea5773ed1
hash73d2899aade924476e58addf26254c2e
hashaa8936431f7bc0fabb0b9efb6ea153f9
hash0e42f20eb0aab1a4570b0e96b36ceb88f2c82643
hash3671eaf95ce83f769ee2bd73f5c1c9e85b34fee1
hashe9f134a3f4bc5bec1f71906c37f325808b9da2d9
hash000e2926f6e094d01c64ff972e958cd38590299e9128a766868088aa273599c7
hash5b3cc9cced1ef0cb0bba5549cc2ac09c49ae10554d2409ea16bc5e118d278c15
hashcca1705d7a85fe45dce9faec5790d498427b3fa8e546d7d7b57f18a925fdfa5d

Threat ID: 6830ee060acd01a2492758c0

Added to database: 5/23/2025, 9:52:06 PM

Last enriched: 6/22/2025, 10:19:38 PM

Last updated: 7/31/2025, 3:59:50 AM

Views: 29

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats