NKNShell Malware Distributed via VPN Website
The NKNShell malware campaign involves a compromised South Korean VPN provider website used to distribute a multi-stage malware payload. The threat actor Larva-24010 deploys several backdoors including MeshAgent, gs-netcat, and a novel Go-based backdoor called NKNShell, which leverages NKN and MQTT protocols for command and control. The infection chain uses trojanized installers and PowerShell scripts, employing advanced evasion techniques such as AMSI and UAC bypasses. Additional tools like SQLMap are deployed to facilitate further exploitation. While primarily targeting Korean VPN users, the sophisticated use of blockchain-based networking protocols and multiple backdoors poses risks to any users of the compromised VPN service. The campaign's medium severity reflects its complexity and targeted nature, but it has not yet been observed exploiting widespread vulnerabilities or causing large-scale impact beyond South Korea.
AI Analysis
Technical Summary
This campaign involves the compromise of a South Korean VPN provider's website to distribute malware, attributed to the Larva-24010 threat actor active since 2023. The attack vector begins with a trojanized VPN installer that, once executed, runs PowerShell scripts to download and deploy multiple payloads. Among these are several backdoors: MeshAgent, a legitimate remote management tool abused for persistence and control; gs-netcat, a lightweight network utility for tunneling; and NKNShell, a newly identified backdoor written in Go. NKNShell uniquely uses the NKN (New Kind of Network) blockchain-based protocol and MQTT messaging protocol for its command and control (C2) communications, enabling stealthy and resilient control channels that are difficult to detect or block. The malware also attempts to bypass Windows security features such as AMSI (Antimalware Scan Interface) and UAC (User Account Control) to evade detection and elevate privileges. The deployment of SQLMap indicates the attackers may be probing for or exploiting SQL injection vulnerabilities on infected systems or networks. The campaign demonstrates a multi-stage infection process with layered payloads and advanced evasion techniques, targeting VPN users primarily in South Korea but potentially affecting any users of the compromised VPN software. The use of blockchain-based networking for C2 is an emerging tactic that complicates traditional network defense mechanisms.
Potential Impact
For European organizations, the direct impact is currently limited due to the campaign's focus on a South Korean VPN provider and Korean user base. However, European users of the compromised VPN service or those who download the trojanized installer could become infected, leading to unauthorized remote access, data theft, and potential lateral movement within corporate networks. The backdoors installed enable attackers to exfiltrate sensitive information, deploy additional tools like SQLMap for further exploitation, and maintain persistent control over infected hosts. The use of advanced evasion techniques increases the difficulty of detection and remediation. If the malware spreads beyond its initial target region, European organizations could face risks to confidentiality, integrity, and availability of their systems. Additionally, the use of blockchain-based C2 channels may bypass conventional network monitoring tools, requiring enhanced detection capabilities. The campaign underscores the risk of supply chain compromises via VPN providers, which are widely used in Europe for secure remote access, especially post-pandemic.
Mitigation Recommendations
European organizations should verify the integrity of VPN software installers and avoid downloading VPN clients from unofficial or untrusted sources. Implement strict application whitelisting and code signing verification to prevent execution of trojanized installers. Enhance endpoint detection and response (EDR) capabilities to identify behaviors associated with MeshAgent, gs-netcat, and NKNShell, including unusual MQTT or NKN protocol network traffic. Monitor for PowerShell script execution and attempts to bypass AMSI or UAC, using behavioral analytics to detect anomalies. Network defenses should be updated to detect and block suspicious MQTT traffic and connections to known malicious domains such as broker.mqtt.cool and kttelecom.duckdns.org. Conduct regular threat hunting for indicators of compromise (IoCs) including the provided file hashes and domain names. Employ multi-factor authentication and least privilege principles to limit the impact of potential backdoor access. Finally, educate users about the risks of downloading software from compromised websites and maintain up-to-date backups to recover from potential ransomware or data destruction attacks that could follow initial compromise.
Affected Countries
South Korea, Germany, United Kingdom, France, Netherlands
Indicators of Compromise
- hash: 0696da5b242023308ad45c50666b2b96
- hash: 0dfea610a526b0d458e84c6cd604b2ab
- hash: 21067f677b8ac8d843a56cd2c19356ff
- hash: 2e9bf8bf256a0c60402e05d6f20c6e3d
- hash: 60f153778e843fc04c6ab239ca650a89
- hash: fd29cd63fb8c4b7fb0c7d3fa893212b9
- hash: 174fe4ee905afa52abdd086f4b1c126b7802fe65
- hash: 6641b02397b414fc3e412ab75650024c902c7478
- hash: 9041e8e41027222299c9b514a0317efa92391927
- hash: d353a4842cd4771f152ac1c8794519581b4312ad
- hash: 1105bbb56fac2f6095e85b8ef309d1d90eed7f3d790141d95f0928261bd3a58e
- hash: 1756b5d536035347ffbe2dbf364906fd66b981e846413723012fb06c8f820d3f
- hash: 7cac63e7dd0c72224324fb6cbc3fb6c41915d60f7f11b38de99ee09a2a3811c5
- hash: cac2f6b86d8b9a1cf6dcc6ea7fb76c4341cc7a86c125304461b52aa920fb202f
- domain: broker.mqtt.cool
- domain: camo.hach.chat
- domain: kttelecom.duckdns.org
- domain: proxy.wingram.org
NKNShell Malware Distributed via VPN Website
Description
The NKNShell malware campaign involves a compromised South Korean VPN provider website used to distribute a multi-stage malware payload. The threat actor Larva-24010 deploys several backdoors including MeshAgent, gs-netcat, and a novel Go-based backdoor called NKNShell, which leverages NKN and MQTT protocols for command and control. The infection chain uses trojanized installers and PowerShell scripts, employing advanced evasion techniques such as AMSI and UAC bypasses. Additional tools like SQLMap are deployed to facilitate further exploitation. While primarily targeting Korean VPN users, the sophisticated use of blockchain-based networking protocols and multiple backdoors poses risks to any users of the compromised VPN service. The campaign's medium severity reflects its complexity and targeted nature, but it has not yet been observed exploiting widespread vulnerabilities or causing large-scale impact beyond South Korea.
AI-Powered Analysis
Technical Analysis
This campaign involves the compromise of a South Korean VPN provider's website to distribute malware, attributed to the Larva-24010 threat actor active since 2023. The attack vector begins with a trojanized VPN installer that, once executed, runs PowerShell scripts to download and deploy multiple payloads. Among these are several backdoors: MeshAgent, a legitimate remote management tool abused for persistence and control; gs-netcat, a lightweight network utility for tunneling; and NKNShell, a newly identified backdoor written in Go. NKNShell uniquely uses the NKN (New Kind of Network) blockchain-based protocol and MQTT messaging protocol for its command and control (C2) communications, enabling stealthy and resilient control channels that are difficult to detect or block. The malware also attempts to bypass Windows security features such as AMSI (Antimalware Scan Interface) and UAC (User Account Control) to evade detection and elevate privileges. The deployment of SQLMap indicates the attackers may be probing for or exploiting SQL injection vulnerabilities on infected systems or networks. The campaign demonstrates a multi-stage infection process with layered payloads and advanced evasion techniques, targeting VPN users primarily in South Korea but potentially affecting any users of the compromised VPN software. The use of blockchain-based networking for C2 is an emerging tactic that complicates traditional network defense mechanisms.
Potential Impact
For European organizations, the direct impact is currently limited due to the campaign's focus on a South Korean VPN provider and Korean user base. However, European users of the compromised VPN service or those who download the trojanized installer could become infected, leading to unauthorized remote access, data theft, and potential lateral movement within corporate networks. The backdoors installed enable attackers to exfiltrate sensitive information, deploy additional tools like SQLMap for further exploitation, and maintain persistent control over infected hosts. The use of advanced evasion techniques increases the difficulty of detection and remediation. If the malware spreads beyond its initial target region, European organizations could face risks to confidentiality, integrity, and availability of their systems. Additionally, the use of blockchain-based C2 channels may bypass conventional network monitoring tools, requiring enhanced detection capabilities. The campaign underscores the risk of supply chain compromises via VPN providers, which are widely used in Europe for secure remote access, especially post-pandemic.
Mitigation Recommendations
European organizations should verify the integrity of VPN software installers and avoid downloading VPN clients from unofficial or untrusted sources. Implement strict application whitelisting and code signing verification to prevent execution of trojanized installers. Enhance endpoint detection and response (EDR) capabilities to identify behaviors associated with MeshAgent, gs-netcat, and NKNShell, including unusual MQTT or NKN protocol network traffic. Monitor for PowerShell script execution and attempts to bypass AMSI or UAC, using behavioral analytics to detect anomalies. Network defenses should be updated to detect and block suspicious MQTT traffic and connections to known malicious domains such as broker.mqtt.cool and kttelecom.duckdns.org. Conduct regular threat hunting for indicators of compromise (IoCs) including the provided file hashes and domain names. Employ multi-factor authentication and least privilege principles to limit the impact of potential backdoor access. Finally, educate users about the risks of downloading software from compromised websites and maintain up-to-date backups to recover from potential ransomware or data destruction attacks that could follow initial compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://asec.ahnlab.com/en/91139"]
- Adversary
- Larva-24010
- Pulse Id
- 691f29a24b6ccf92e10ec97a
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash0696da5b242023308ad45c50666b2b96 | — | |
hash0dfea610a526b0d458e84c6cd604b2ab | — | |
hash21067f677b8ac8d843a56cd2c19356ff | — | |
hash2e9bf8bf256a0c60402e05d6f20c6e3d | — | |
hash60f153778e843fc04c6ab239ca650a89 | — | |
hashfd29cd63fb8c4b7fb0c7d3fa893212b9 | — | |
hash174fe4ee905afa52abdd086f4b1c126b7802fe65 | — | |
hash6641b02397b414fc3e412ab75650024c902c7478 | — | |
hash9041e8e41027222299c9b514a0317efa92391927 | — | |
hashd353a4842cd4771f152ac1c8794519581b4312ad | — | |
hash1105bbb56fac2f6095e85b8ef309d1d90eed7f3d790141d95f0928261bd3a58e | — | |
hash1756b5d536035347ffbe2dbf364906fd66b981e846413723012fb06c8f820d3f | — | |
hash7cac63e7dd0c72224324fb6cbc3fb6c41915d60f7f11b38de99ee09a2a3811c5 | — | |
hashcac2f6b86d8b9a1cf6dcc6ea7fb76c4341cc7a86c125304461b52aa920fb202f | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainbroker.mqtt.cool | — | |
domaincamo.hach.chat | — | |
domainkttelecom.duckdns.org | — | |
domainproxy.wingram.org | — |
Threat ID: 691f9295b342c1dca420b6be
Added to database: 11/20/2025, 10:13:41 PM
Last enriched: 11/20/2025, 10:24:26 PM
Last updated: 11/21/2025, 1:51:18 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
The Tsundere botnet uses the Ethereum blockchain to infect its targets
MediumIt's not personal, it's just business
MediumWhatsApp compromise leads to Astaroth deployment
MediumOctober 2025 Trends Report on Phishing Emails
MediumOctober 2025 Infostealer Trend Report
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.