Malware MoonPeak Executed via LNK Files
In January 2026, IIJ observed malicious LNK files targeting Korean users to execute the MoonPeak malware, attributed to North Korean threat actors. The infection chain begins with a LNK file that runs an obfuscated PowerShell script, which checks for analysis environments, creates additional scripts, and sets up persistence. The second stage downloads and executes a payload from GitHub, which is actually the MoonPeak malware. MoonPeak is obfuscated using ConfuserEx and communicates with a C2 server. The campaign utilizes GitHub for hosting malware, a technique known as Living Off Trusted Sites (LOTS). This attack demonstrates the ongoing threat posed by North Korean actors targeting various countries and individuals worldwide.
AI Analysis
Technical Summary
In January 2026, a campaign involving the MoonPeak malware was observed by IIJ, targeting Korean users through malicious LNK shortcut files. These LNK files execute obfuscated PowerShell scripts that first check for sandbox or analysis environments to evade detection. The scripts then create additional scripts and establish persistence mechanisms on the infected host. The second stage of the infection downloads the MoonPeak payload from GitHub, a legitimate and trusted platform, exemplifying the Living Off Trusted Sites (LOTS) technique which complicates detection and blocking efforts. MoonPeak itself is obfuscated using ConfuserEx, a .NET obfuscator, making reverse engineering and signature-based detection more difficult. Once executed, MoonPeak communicates with a command and control (C2) server to receive instructions and potentially exfiltrate data. The attack chain leverages multiple MITRE ATT&CK techniques including user execution via LNK files (T1204.002), obfuscated files or information (T1027), persistence through registry run keys (T1547.001), and command and scripting interpreter usage (T1059.001). The use of GitHub as a malware hosting platform allows the adversary to blend malicious activity with legitimate traffic, increasing the challenge for defenders. Although the campaign is currently focused on Korean users, the techniques and delivery mechanisms are applicable globally, especially to organizations using Windows environments that support LNK files and PowerShell. The threat actor is attributed to North Korea (DPRK), known for persistent cyber espionage and disruptive operations. No known exploits in the wild have been reported beyond the described infection chain, but the sophistication and stealth of the campaign warrant attention.
Potential Impact
For European organizations, the MoonPeak malware campaign presents a significant risk due to its stealthy infection vector and use of trusted platforms for payload delivery. If successful, the malware can establish persistence, enabling long-term access to compromised systems, potentially leading to espionage, data theft, or disruption of operations. The use of obfuscated PowerShell scripts and LOTS techniques complicates detection by traditional antivirus and network security tools. European organizations with Windows environments that allow execution of LNK files and PowerShell scripts are vulnerable, especially if users are not trained to recognize suspicious files or if endpoint protections are insufficient. The campaign’s reliance on GitHub for hosting payloads may bypass some network filtering rules, increasing the likelihood of successful payload delivery. The medium severity rating reflects the need for user interaction and the absence of zero-day exploits, but the persistence and stealth capabilities increase the potential impact on confidentiality and integrity of sensitive data. Additionally, the geopolitical context of North Korean threat actors targeting global victims suggests that critical infrastructure, government entities, and industries with strategic importance in Europe could be targeted for espionage or disruption.
Mitigation Recommendations
1. Implement strict email and endpoint filtering to block or quarantine LNK files and other suspicious attachments, especially from unknown or untrusted sources. 2. Enforce application whitelisting policies that restrict execution of PowerShell scripts and LNK files unless explicitly authorized. 3. Enable PowerShell logging and monitor for obfuscated or suspicious script execution patterns to detect early signs of infection. 4. Use endpoint detection and response (EDR) solutions capable of identifying LOTS techniques and anomalous GitHub traffic related to malware downloads. 5. Educate users about the risks of opening unsolicited shortcut files and the importance of verifying file origins. 6. Restrict or monitor outbound network connections to GitHub repositories that are not business-critical, and consider implementing network segmentation to limit lateral movement. 7. Regularly update and patch systems to reduce the attack surface, and conduct threat hunting exercises focusing on persistence mechanisms such as registry run keys and scheduled tasks. 8. Employ multi-factor authentication and least privilege principles to limit the impact if credentials are compromised. 9. Collaborate with threat intelligence providers to stay updated on emerging indicators of compromise (IOCs) related to MoonPeak and similar threats. 10. Conduct regular backups and verify recovery procedures to mitigate potential data loss or ransomware scenarios linked to persistent malware presence.
Affected Countries
South Korea, United Kingdom, Germany, France, Netherlands, Italy, Poland
Indicators of Compromise
- hash: 640f54bb6d29d98d92344136fee49d07
- hash: ea5d9be286f7af423c070128af170085
- hash: 665a1cdb7f050816dcb7b90a5516f2a38613e281
- hash: d8e96e777de3234e0771e6c53b7c09a659542f12
- hash: ebec41675fff24858ad558429ce4e4e32c30da55
- hash: 1553bfac012b20a39822c5f2ef3a7bd97f52bb94ae631ac1178003b7d42e7b7f
- hash: 8de36cb635eb87c1aa0e8219f1d8bf2bb44cad75b58ef421de77dd1aae669bf4
- hash: aaac6eadac6c325bfc69b561d75f7cfd979ac289de1cc4430c5cc9a9a655b279
- ip: 27.102.137.88
Malware MoonPeak Executed via LNK Files
Description
In January 2026, IIJ observed malicious LNK files targeting Korean users to execute the MoonPeak malware, attributed to North Korean threat actors. The infection chain begins with a LNK file that runs an obfuscated PowerShell script, which checks for analysis environments, creates additional scripts, and sets up persistence. The second stage downloads and executes a payload from GitHub, which is actually the MoonPeak malware. MoonPeak is obfuscated using ConfuserEx and communicates with a C2 server. The campaign utilizes GitHub for hosting malware, a technique known as Living Off Trusted Sites (LOTS). This attack demonstrates the ongoing threat posed by North Korean actors targeting various countries and individuals worldwide.
AI-Powered Analysis
Technical Analysis
In January 2026, a campaign involving the MoonPeak malware was observed by IIJ, targeting Korean users through malicious LNK shortcut files. These LNK files execute obfuscated PowerShell scripts that first check for sandbox or analysis environments to evade detection. The scripts then create additional scripts and establish persistence mechanisms on the infected host. The second stage of the infection downloads the MoonPeak payload from GitHub, a legitimate and trusted platform, exemplifying the Living Off Trusted Sites (LOTS) technique which complicates detection and blocking efforts. MoonPeak itself is obfuscated using ConfuserEx, a .NET obfuscator, making reverse engineering and signature-based detection more difficult. Once executed, MoonPeak communicates with a command and control (C2) server to receive instructions and potentially exfiltrate data. The attack chain leverages multiple MITRE ATT&CK techniques including user execution via LNK files (T1204.002), obfuscated files or information (T1027), persistence through registry run keys (T1547.001), and command and scripting interpreter usage (T1059.001). The use of GitHub as a malware hosting platform allows the adversary to blend malicious activity with legitimate traffic, increasing the challenge for defenders. Although the campaign is currently focused on Korean users, the techniques and delivery mechanisms are applicable globally, especially to organizations using Windows environments that support LNK files and PowerShell. The threat actor is attributed to North Korea (DPRK), known for persistent cyber espionage and disruptive operations. No known exploits in the wild have been reported beyond the described infection chain, but the sophistication and stealth of the campaign warrant attention.
Potential Impact
For European organizations, the MoonPeak malware campaign presents a significant risk due to its stealthy infection vector and use of trusted platforms for payload delivery. If successful, the malware can establish persistence, enabling long-term access to compromised systems, potentially leading to espionage, data theft, or disruption of operations. The use of obfuscated PowerShell scripts and LOTS techniques complicates detection by traditional antivirus and network security tools. European organizations with Windows environments that allow execution of LNK files and PowerShell scripts are vulnerable, especially if users are not trained to recognize suspicious files or if endpoint protections are insufficient. The campaign’s reliance on GitHub for hosting payloads may bypass some network filtering rules, increasing the likelihood of successful payload delivery. The medium severity rating reflects the need for user interaction and the absence of zero-day exploits, but the persistence and stealth capabilities increase the potential impact on confidentiality and integrity of sensitive data. Additionally, the geopolitical context of North Korean threat actors targeting global victims suggests that critical infrastructure, government entities, and industries with strategic importance in Europe could be targeted for espionage or disruption.
Mitigation Recommendations
1. Implement strict email and endpoint filtering to block or quarantine LNK files and other suspicious attachments, especially from unknown or untrusted sources. 2. Enforce application whitelisting policies that restrict execution of PowerShell scripts and LNK files unless explicitly authorized. 3. Enable PowerShell logging and monitor for obfuscated or suspicious script execution patterns to detect early signs of infection. 4. Use endpoint detection and response (EDR) solutions capable of identifying LOTS techniques and anomalous GitHub traffic related to malware downloads. 5. Educate users about the risks of opening unsolicited shortcut files and the importance of verifying file origins. 6. Restrict or monitor outbound network connections to GitHub repositories that are not business-critical, and consider implementing network segmentation to limit lateral movement. 7. Regularly update and patch systems to reduce the attack surface, and conduct threat hunting exercises focusing on persistence mechanisms such as registry run keys and scheduled tasks. 8. Employ multi-factor authentication and least privilege principles to limit the impact if credentials are compromised. 9. Collaborate with threat intelligence providers to stay updated on emerging indicators of compromise (IOCs) related to MoonPeak and similar threats. 10. Conduct regular backups and verify recovery procedures to mitigate potential data loss or ransomware scenarios linked to persistent malware presence.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://sect.iij.ad.jp/blog/2026/01/dprk-moonpeak-executed-via-malicious-lnk-file"]
- Adversary
- North Korea (DPRK)
- Pulse Id
- 69777a203745e70e7425106f
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash640f54bb6d29d98d92344136fee49d07 | — | |
hashea5d9be286f7af423c070128af170085 | — | |
hash665a1cdb7f050816dcb7b90a5516f2a38613e281 | — | |
hashd8e96e777de3234e0771e6c53b7c09a659542f12 | — | |
hashebec41675fff24858ad558429ce4e4e32c30da55 | — | |
hash1553bfac012b20a39822c5f2ef3a7bd97f52bb94ae631ac1178003b7d42e7b7f | — | |
hash8de36cb635eb87c1aa0e8219f1d8bf2bb44cad75b58ef421de77dd1aae669bf4 | — | |
hashaaac6eadac6c325bfc69b561d75f7cfd979ac289de1cc4430c5cc9a9a655b279 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip27.102.137.88 | — |
Threat ID: 6977a9814623b1157caf7565
Added to database: 1/26/2026, 5:50:57 PM
Last enriched: 1/26/2026, 6:07:37 PM
Last updated: 2/6/2026, 4:08:48 PM
Views: 137
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-02-05
MediumTechnical Analysis of Marco Stealer
MediumNew Clickfix variant 'CrashFix' deploying Python Remote Access Trojan
MediumKnife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework
MediumSystemBC Infects 10,000 Devices After Defying Law Enforcement Takedown
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.