Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

NKNShell Malware Distributed via VPN Website

0
Medium
Published: Thu Nov 20 2025 (11/20/2025, 14:45:54 UTC)
Source: AlienVault OTX General

Description

The NKNShell malware campaign involves a compromised South Korean VPN provider website used to distribute a multi-stage malware payload. The threat actor Larva-24010 deploys several backdoors including MeshAgent, gs-netcat, and a novel Go-based backdoor called NKNShell, which leverages NKN and MQTT protocols for command and control. The infection chain uses trojanized installers and PowerShell scripts, employing advanced evasion techniques such as AMSI and UAC bypasses. Additional tools like SQLMap are deployed to facilitate further exploitation. While primarily targeting Korean VPN users, the sophisticated use of blockchain-based networking protocols and multiple backdoors poses risks to any users of the compromised VPN service. The campaign's medium severity reflects its complexity and targeted nature, but it has not yet been observed exploiting widespread vulnerabilities or causing large-scale impact beyond South Korea.

AI-Powered Analysis

AILast updated: 11/20/2025, 22:24:26 UTC

Technical Analysis

This campaign involves the compromise of a South Korean VPN provider's website to distribute malware, attributed to the Larva-24010 threat actor active since 2023. The attack vector begins with a trojanized VPN installer that, once executed, runs PowerShell scripts to download and deploy multiple payloads. Among these are several backdoors: MeshAgent, a legitimate remote management tool abused for persistence and control; gs-netcat, a lightweight network utility for tunneling; and NKNShell, a newly identified backdoor written in Go. NKNShell uniquely uses the NKN (New Kind of Network) blockchain-based protocol and MQTT messaging protocol for its command and control (C2) communications, enabling stealthy and resilient control channels that are difficult to detect or block. The malware also attempts to bypass Windows security features such as AMSI (Antimalware Scan Interface) and UAC (User Account Control) to evade detection and elevate privileges. The deployment of SQLMap indicates the attackers may be probing for or exploiting SQL injection vulnerabilities on infected systems or networks. The campaign demonstrates a multi-stage infection process with layered payloads and advanced evasion techniques, targeting VPN users primarily in South Korea but potentially affecting any users of the compromised VPN software. The use of blockchain-based networking for C2 is an emerging tactic that complicates traditional network defense mechanisms.

Potential Impact

For European organizations, the direct impact is currently limited due to the campaign's focus on a South Korean VPN provider and Korean user base. However, European users of the compromised VPN service or those who download the trojanized installer could become infected, leading to unauthorized remote access, data theft, and potential lateral movement within corporate networks. The backdoors installed enable attackers to exfiltrate sensitive information, deploy additional tools like SQLMap for further exploitation, and maintain persistent control over infected hosts. The use of advanced evasion techniques increases the difficulty of detection and remediation. If the malware spreads beyond its initial target region, European organizations could face risks to confidentiality, integrity, and availability of their systems. Additionally, the use of blockchain-based C2 channels may bypass conventional network monitoring tools, requiring enhanced detection capabilities. The campaign underscores the risk of supply chain compromises via VPN providers, which are widely used in Europe for secure remote access, especially post-pandemic.

Mitigation Recommendations

European organizations should verify the integrity of VPN software installers and avoid downloading VPN clients from unofficial or untrusted sources. Implement strict application whitelisting and code signing verification to prevent execution of trojanized installers. Enhance endpoint detection and response (EDR) capabilities to identify behaviors associated with MeshAgent, gs-netcat, and NKNShell, including unusual MQTT or NKN protocol network traffic. Monitor for PowerShell script execution and attempts to bypass AMSI or UAC, using behavioral analytics to detect anomalies. Network defenses should be updated to detect and block suspicious MQTT traffic and connections to known malicious domains such as broker.mqtt.cool and kttelecom.duckdns.org. Conduct regular threat hunting for indicators of compromise (IoCs) including the provided file hashes and domain names. Employ multi-factor authentication and least privilege principles to limit the impact of potential backdoor access. Finally, educate users about the risks of downloading software from compromised websites and maintain up-to-date backups to recover from potential ransomware or data destruction attacks that could follow initial compromise.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://asec.ahnlab.com/en/91139"]
Adversary
Larva-24010
Pulse Id
691f29a24b6ccf92e10ec97a
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash0696da5b242023308ad45c50666b2b96
hash0dfea610a526b0d458e84c6cd604b2ab
hash21067f677b8ac8d843a56cd2c19356ff
hash2e9bf8bf256a0c60402e05d6f20c6e3d
hash60f153778e843fc04c6ab239ca650a89
hashfd29cd63fb8c4b7fb0c7d3fa893212b9
hash174fe4ee905afa52abdd086f4b1c126b7802fe65
hash6641b02397b414fc3e412ab75650024c902c7478
hash9041e8e41027222299c9b514a0317efa92391927
hashd353a4842cd4771f152ac1c8794519581b4312ad
hash1105bbb56fac2f6095e85b8ef309d1d90eed7f3d790141d95f0928261bd3a58e
hash1756b5d536035347ffbe2dbf364906fd66b981e846413723012fb06c8f820d3f
hash7cac63e7dd0c72224324fb6cbc3fb6c41915d60f7f11b38de99ee09a2a3811c5
hashcac2f6b86d8b9a1cf6dcc6ea7fb76c4341cc7a86c125304461b52aa920fb202f

Domain

ValueDescriptionCopy
domainbroker.mqtt.cool
domaincamo.hach.chat
domainkttelecom.duckdns.org
domainproxy.wingram.org

Threat ID: 691f9295b342c1dca420b6be

Added to database: 11/20/2025, 10:13:41 PM

Last enriched: 11/20/2025, 10:24:26 PM

Last updated: 11/21/2025, 1:51:18 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats