Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Malware MoonPeak Executed via LNK Files

0
Medium
Published: Mon Jan 26 2026 (01/26/2026, 14:28:48 UTC)
Source: AlienVault OTX General

Description

In January 2026, IIJ observed malicious LNK files targeting Korean users to execute the MoonPeak malware, attributed to North Korean threat actors. The infection chain begins with a LNK file that runs an obfuscated PowerShell script, which checks for analysis environments, creates additional scripts, and sets up persistence. The second stage downloads and executes a payload from GitHub, which is actually the MoonPeak malware. MoonPeak is obfuscated using ConfuserEx and communicates with a C2 server. The campaign utilizes GitHub for hosting malware, a technique known as Living Off Trusted Sites (LOTS). This attack demonstrates the ongoing threat posed by North Korean actors targeting various countries and individuals worldwide.

AI-Powered Analysis

AILast updated: 01/26/2026, 18:07:37 UTC

Technical Analysis

In January 2026, a campaign involving the MoonPeak malware was observed by IIJ, targeting Korean users through malicious LNK shortcut files. These LNK files execute obfuscated PowerShell scripts that first check for sandbox or analysis environments to evade detection. The scripts then create additional scripts and establish persistence mechanisms on the infected host. The second stage of the infection downloads the MoonPeak payload from GitHub, a legitimate and trusted platform, exemplifying the Living Off Trusted Sites (LOTS) technique which complicates detection and blocking efforts. MoonPeak itself is obfuscated using ConfuserEx, a .NET obfuscator, making reverse engineering and signature-based detection more difficult. Once executed, MoonPeak communicates with a command and control (C2) server to receive instructions and potentially exfiltrate data. The attack chain leverages multiple MITRE ATT&CK techniques including user execution via LNK files (T1204.002), obfuscated files or information (T1027), persistence through registry run keys (T1547.001), and command and scripting interpreter usage (T1059.001). The use of GitHub as a malware hosting platform allows the adversary to blend malicious activity with legitimate traffic, increasing the challenge for defenders. Although the campaign is currently focused on Korean users, the techniques and delivery mechanisms are applicable globally, especially to organizations using Windows environments that support LNK files and PowerShell. The threat actor is attributed to North Korea (DPRK), known for persistent cyber espionage and disruptive operations. No known exploits in the wild have been reported beyond the described infection chain, but the sophistication and stealth of the campaign warrant attention.

Potential Impact

For European organizations, the MoonPeak malware campaign presents a significant risk due to its stealthy infection vector and use of trusted platforms for payload delivery. If successful, the malware can establish persistence, enabling long-term access to compromised systems, potentially leading to espionage, data theft, or disruption of operations. The use of obfuscated PowerShell scripts and LOTS techniques complicates detection by traditional antivirus and network security tools. European organizations with Windows environments that allow execution of LNK files and PowerShell scripts are vulnerable, especially if users are not trained to recognize suspicious files or if endpoint protections are insufficient. The campaign’s reliance on GitHub for hosting payloads may bypass some network filtering rules, increasing the likelihood of successful payload delivery. The medium severity rating reflects the need for user interaction and the absence of zero-day exploits, but the persistence and stealth capabilities increase the potential impact on confidentiality and integrity of sensitive data. Additionally, the geopolitical context of North Korean threat actors targeting global victims suggests that critical infrastructure, government entities, and industries with strategic importance in Europe could be targeted for espionage or disruption.

Mitigation Recommendations

1. Implement strict email and endpoint filtering to block or quarantine LNK files and other suspicious attachments, especially from unknown or untrusted sources. 2. Enforce application whitelisting policies that restrict execution of PowerShell scripts and LNK files unless explicitly authorized. 3. Enable PowerShell logging and monitor for obfuscated or suspicious script execution patterns to detect early signs of infection. 4. Use endpoint detection and response (EDR) solutions capable of identifying LOTS techniques and anomalous GitHub traffic related to malware downloads. 5. Educate users about the risks of opening unsolicited shortcut files and the importance of verifying file origins. 6. Restrict or monitor outbound network connections to GitHub repositories that are not business-critical, and consider implementing network segmentation to limit lateral movement. 7. Regularly update and patch systems to reduce the attack surface, and conduct threat hunting exercises focusing on persistence mechanisms such as registry run keys and scheduled tasks. 8. Employ multi-factor authentication and least privilege principles to limit the impact if credentials are compromised. 9. Collaborate with threat intelligence providers to stay updated on emerging indicators of compromise (IOCs) related to MoonPeak and similar threats. 10. Conduct regular backups and verify recovery procedures to mitigate potential data loss or ransomware scenarios linked to persistent malware presence.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://sect.iij.ad.jp/blog/2026/01/dprk-moonpeak-executed-via-malicious-lnk-file"]
Adversary
North Korea (DPRK)
Pulse Id
69777a203745e70e7425106f
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash640f54bb6d29d98d92344136fee49d07
hashea5d9be286f7af423c070128af170085
hash665a1cdb7f050816dcb7b90a5516f2a38613e281
hashd8e96e777de3234e0771e6c53b7c09a659542f12
hashebec41675fff24858ad558429ce4e4e32c30da55
hash1553bfac012b20a39822c5f2ef3a7bd97f52bb94ae631ac1178003b7d42e7b7f
hash8de36cb635eb87c1aa0e8219f1d8bf2bb44cad75b58ef421de77dd1aae669bf4
hashaaac6eadac6c325bfc69b561d75f7cfd979ac289de1cc4430c5cc9a9a655b279

Ip

ValueDescriptionCopy
ip27.102.137.88

Threat ID: 6977a9814623b1157caf7565

Added to database: 1/26/2026, 5:50:57 PM

Last enriched: 1/26/2026, 6:07:37 PM

Last updated: 2/6/2026, 4:08:48 PM

Views: 137

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats