Case of Larva-25004 Group (Related to Kimsuky) Exploiting Additional Certificate - Malware Signed with Nexaweb Certificate
AhnLab Security Intelligence Center discovered malware signed with Nexaweb Inc.'s certificate, linked to the Kimsuky group's activities. The malware, tracked as Larva-25004, was found in two files signed on May 24 and 28, 2024. When executed, it displays a PDF file related to employment as bait, likely targeting individuals interested in defense company jobs. The certificate's authenticity is still under investigation. The malware's characteristics match those of files signed with a Korean company's certificate, previously reported in connection with Kimsuky. This incident highlights the ongoing threat of certificate exploitation by sophisticated threat actors.
AI Analysis
Technical Summary
The Larva-25004 malware campaign, attributed to the Kimsuky threat group, represents a sophisticated case of digital certificate exploitation involving the misuse of a legitimate certificate issued to Nexaweb Inc., a Korean software company. Discovered by the AhnLab Security Intelligence Center, the malware samples were signed on May 24 and 28, 2024, and employ social engineering by displaying a PDF document related to employment opportunities as bait. This lure specifically targets individuals interested in defense sector jobs, aiming to entice them into executing the malware. The use of a legitimate Nexaweb certificate enhances the malware's credibility and helps it evade detection by security solutions that trust signed executables. Although the authenticity of the certificate is under investigation, the malware's characteristics align with previous Kimsuky operations that exploited certificates from Korean companies. The malware incorporates multiple tactics and techniques identified by MITRE ATT&CK, including scheduled task execution (T1053.005), input capture (T1056.001), user execution (T1204.002), spearphishing attachment (T1566.001), masquerading (T1036.002), obfuscated files or information (T1027), command and scripting interpreter (T1059.003), and compromised certificate use (T1588.003). Indicators of compromise include multiple file hashes associated with the malware samples. No known exploits in the wild have been reported yet, and the threat is currently assessed as medium severity. This incident highlights the ongoing threat posed by advanced persistent threat (APT) actors who leverage stolen or compromised certificates to bypass security controls and infiltrate targeted networks stealthily.
Potential Impact
For European organizations, particularly those in the defense, aerospace, and critical infrastructure sectors, the Larva-25004 malware poses a significant espionage and operational risk. The malware’s use of employment-related bait suggests a spear-phishing vector aimed at individuals with access to sensitive information or systems, increasing the likelihood of targeted compromise. Successful execution could enable unauthorized access, data exfiltration, and lateral movement within networks, potentially compromising confidential defense projects, strategic technologies, or intellectual property. The exploitation of a legitimate certificate complicates detection and increases the chance of successful infiltration and prolonged undetected presence. European defense contractors, research institutions, and organizations collaborating with Korean or allied defense entities may be particularly vulnerable. Although the malware does not currently appear to cause immediate disruption, its stealth and targeted nature could lead to significant intelligence losses and operational impacts over time, undermining national security interests and industrial competitiveness.
Mitigation Recommendations
1. Enforce strict certificate validation policies, including real-time certificate revocation checks via CRL and OCSP, to detect and block binaries signed with compromised or unauthorized certificates. 2. Implement application whitelisting that evaluates not only the presence of a valid signature but also the reputation and trustworthiness of the certificate issuer and signer, incorporating threat intelligence on known malicious certificates. 3. Enhance email security by deploying advanced attachment sandboxing and heuristic analysis focused on employment-related documents, especially those from external or unverified sources. 4. Conduct targeted user awareness training emphasizing spear-phishing tactics involving recruitment lures, teaching users to verify unexpected job-related communications through independent channels. 5. Monitor endpoint and network activity for anomalous behaviors such as unusual scheduled tasks, input capture attempts, or command interpreter usage indicative of malware execution. 6. Integrate threat intelligence feeds containing indicators of compromise, including the provided file hashes, into security monitoring and incident response workflows for rapid detection and containment. 7. Collaborate with certificate authorities and software vendors to promptly revoke and replace compromised certificates and notify affected organizations. 8. For organizations with defense sector exposure, deploy enhanced logging, anomaly detection, and endpoint detection and response (EDR) solutions tailored to identify lateral movement, credential misuse, and other APT behaviors associated with Kimsuky. 9. Regularly audit and restrict permissions related to certificate management and software signing within the organization to prevent unauthorized certificate use.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands
Indicators of Compromise
- hash: 0315e137a6e2d658f07af454c63a0af2
- hash: 27d4ff7439694041ef86233c2b804e1f
- hash: 28ce4d33e7994c2be95816eea5773ed1
- hash: 73d2899aade924476e58addf26254c2e
- hash: aa8936431f7bc0fabb0b9efb6ea153f9
- hash: 0e42f20eb0aab1a4570b0e96b36ceb88f2c82643
- hash: 3671eaf95ce83f769ee2bd73f5c1c9e85b34fee1
- hash: e9f134a3f4bc5bec1f71906c37f325808b9da2d9
- hash: 000e2926f6e094d01c64ff972e958cd38590299e9128a766868088aa273599c7
- hash: 5b3cc9cced1ef0cb0bba5549cc2ac09c49ae10554d2409ea16bc5e118d278c15
- hash: cca1705d7a85fe45dce9faec5790d498427b3fa8e546d7d7b57f18a925fdfa5d
Case of Larva-25004 Group (Related to Kimsuky) Exploiting Additional Certificate - Malware Signed with Nexaweb Certificate
Description
AhnLab Security Intelligence Center discovered malware signed with Nexaweb Inc.'s certificate, linked to the Kimsuky group's activities. The malware, tracked as Larva-25004, was found in two files signed on May 24 and 28, 2024. When executed, it displays a PDF file related to employment as bait, likely targeting individuals interested in defense company jobs. The certificate's authenticity is still under investigation. The malware's characteristics match those of files signed with a Korean company's certificate, previously reported in connection with Kimsuky. This incident highlights the ongoing threat of certificate exploitation by sophisticated threat actors.
AI-Powered Analysis
Technical Analysis
The Larva-25004 malware campaign, attributed to the Kimsuky threat group, represents a sophisticated case of digital certificate exploitation involving the misuse of a legitimate certificate issued to Nexaweb Inc., a Korean software company. Discovered by the AhnLab Security Intelligence Center, the malware samples were signed on May 24 and 28, 2024, and employ social engineering by displaying a PDF document related to employment opportunities as bait. This lure specifically targets individuals interested in defense sector jobs, aiming to entice them into executing the malware. The use of a legitimate Nexaweb certificate enhances the malware's credibility and helps it evade detection by security solutions that trust signed executables. Although the authenticity of the certificate is under investigation, the malware's characteristics align with previous Kimsuky operations that exploited certificates from Korean companies. The malware incorporates multiple tactics and techniques identified by MITRE ATT&CK, including scheduled task execution (T1053.005), input capture (T1056.001), user execution (T1204.002), spearphishing attachment (T1566.001), masquerading (T1036.002), obfuscated files or information (T1027), command and scripting interpreter (T1059.003), and compromised certificate use (T1588.003). Indicators of compromise include multiple file hashes associated with the malware samples. No known exploits in the wild have been reported yet, and the threat is currently assessed as medium severity. This incident highlights the ongoing threat posed by advanced persistent threat (APT) actors who leverage stolen or compromised certificates to bypass security controls and infiltrate targeted networks stealthily.
Potential Impact
For European organizations, particularly those in the defense, aerospace, and critical infrastructure sectors, the Larva-25004 malware poses a significant espionage and operational risk. The malware’s use of employment-related bait suggests a spear-phishing vector aimed at individuals with access to sensitive information or systems, increasing the likelihood of targeted compromise. Successful execution could enable unauthorized access, data exfiltration, and lateral movement within networks, potentially compromising confidential defense projects, strategic technologies, or intellectual property. The exploitation of a legitimate certificate complicates detection and increases the chance of successful infiltration and prolonged undetected presence. European defense contractors, research institutions, and organizations collaborating with Korean or allied defense entities may be particularly vulnerable. Although the malware does not currently appear to cause immediate disruption, its stealth and targeted nature could lead to significant intelligence losses and operational impacts over time, undermining national security interests and industrial competitiveness.
Mitigation Recommendations
1. Enforce strict certificate validation policies, including real-time certificate revocation checks via CRL and OCSP, to detect and block binaries signed with compromised or unauthorized certificates. 2. Implement application whitelisting that evaluates not only the presence of a valid signature but also the reputation and trustworthiness of the certificate issuer and signer, incorporating threat intelligence on known malicious certificates. 3. Enhance email security by deploying advanced attachment sandboxing and heuristic analysis focused on employment-related documents, especially those from external or unverified sources. 4. Conduct targeted user awareness training emphasizing spear-phishing tactics involving recruitment lures, teaching users to verify unexpected job-related communications through independent channels. 5. Monitor endpoint and network activity for anomalous behaviors such as unusual scheduled tasks, input capture attempts, or command interpreter usage indicative of malware execution. 6. Integrate threat intelligence feeds containing indicators of compromise, including the provided file hashes, into security monitoring and incident response workflows for rapid detection and containment. 7. Collaborate with certificate authorities and software vendors to promptly revoke and replace compromised certificates and notify affected organizations. 8. For organizations with defense sector exposure, deploy enhanced logging, anomaly detection, and endpoint detection and response (EDR) solutions tailored to identify lateral movement, credential misuse, and other APT behaviors associated with Kimsuky. 9. Regularly audit and restrict permissions related to certificate management and software signing within the organization to prevent unauthorized certificate use.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://asec.ahnlab.com/en/88132"]
- Adversary
- Larva-25004
- Pulse Id
- 6830d7d91482affcc8045e98
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash0315e137a6e2d658f07af454c63a0af2 | — | |
hash27d4ff7439694041ef86233c2b804e1f | — | |
hash28ce4d33e7994c2be95816eea5773ed1 | — | |
hash73d2899aade924476e58addf26254c2e | — | |
hashaa8936431f7bc0fabb0b9efb6ea153f9 | — | |
hash0e42f20eb0aab1a4570b0e96b36ceb88f2c82643 | — | |
hash3671eaf95ce83f769ee2bd73f5c1c9e85b34fee1 | — | |
hashe9f134a3f4bc5bec1f71906c37f325808b9da2d9 | — | |
hash000e2926f6e094d01c64ff972e958cd38590299e9128a766868088aa273599c7 | — | |
hash5b3cc9cced1ef0cb0bba5549cc2ac09c49ae10554d2409ea16bc5e118d278c15 | — | |
hashcca1705d7a85fe45dce9faec5790d498427b3fa8e546d7d7b57f18a925fdfa5d | — |
Threat ID: 6830ee060acd01a2492758c0
Added to database: 5/23/2025, 9:52:06 PM
Last enriched: 6/22/2025, 10:19:38 PM
Last updated: 7/31/2025, 3:59:50 AM
Views: 29
Related Threats
Scammers Compromised by Own Malware, Expose $4.67M Operation and Identities
MediumThreatFox IOCs for 2025-08-15
MediumThreat Actor Profile: Interlock Ransomware
Medium'Blue Locker' Analysis: Ransomware Targeting Oil & Gas Sector in Pakistan
MediumKawabunga, Dude, You've Been Ransomed!
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.