Pretexting-Based Targeted Intrusion: Analysis of Facebook Reconnaissance and Software Tampering Attacks
APT37 conducted a sophisticated social engineering campaign utilizing Facebook accounts claiming locations in Pyongyang and Pyongsong, North Korea, to conduct reconnaissance and build trust with targets. After establishing relationships through Facebook Messenger, the threat actor migrated conversations to Telegram and employed pretexting tactics, claiming to share encrypted PDF documents containing military weapons information. Victims were persuaded to install a tampered Wondershare PDFelement installer that executed embedded shellcode for initial compromise. The attack chain delivered follow-on commands through a JPG-disguised payload hosted on a compromised Japanese real estate website. The malware abused Zoho WorkDrive OAuth2 APIs as C2 channels, exfiltrating screenshots, documents, system information, and audio files. The campaign employed multiple evasion techniques including code cave injection, process hollowing into legitimate dism.exe, XOR encryption layers, and fileless in-memory execution.
AI Analysis
Technical Summary
This threat involves a sophisticated pretexting-based intrusion by APT37 leveraging social engineering via Facebook and Telegram to deliver a tampered installer of Wondershare PDFelement that executes embedded shellcode for initial compromise. Follow-on payloads are disguised as JPG files hosted on a compromised Japanese real estate website. The malware uses Zoho WorkDrive OAuth2 APIs as covert command and control channels to exfiltrate screenshots, documents, system information, and audio files. Multiple evasion techniques such as code cave injection, process hollowing into legitimate dism.exe processes, XOR encryption layers, and fileless in-memory execution are employed to avoid detection. Indicators include multiple file hashes, IP addresses, URLs, domains, and an email address linked to the campaign. There is no CVE or patch information available, and no known exploits in the wild have been reported.
Potential Impact
The campaign enables initial system compromise through social engineering and tampered software installers, leading to unauthorized execution of malicious code. The attacker gains persistent access and exfiltrates sensitive data including screenshots, documents, system information, and audio files. The use of legitimate services (Zoho WorkDrive OAuth2 APIs) for command and control complicates detection and mitigation. The advanced evasion techniques increase the difficulty of identifying and removing the malware once infected.
Mitigation Recommendations
No official patch or remediation guidance is provided for this threat. Organizations should be aware of the social engineering tactics used and avoid installing software from untrusted or unexpected sources. Monitoring for indicators of compromise such as the provided file hashes, IP addresses, URLs, and domains can aid detection. Since this is a targeted intrusion using sophisticated evasion, endpoint detection and response solutions with behavioral analysis may help identify suspicious activity. Patch status is not yet confirmed — check vendor advisories and threat intelligence updates for any future remediation guidance.
Indicators of Compromise
- hash: 085128b4e96633c82beb2101f5c525e4
- hash: 28d0143718153bf04c1919a26bb70c2d
- hash: 36be2cbb59cd1c3f745d5f80f9aee21c
- hash: c637b3e7d74c2d678663454d16311b15
- hash: c681fe3f42e82e9240afe97c23971cbc
- hash: d44a22d2c969988a65c7d927e22364c8
- hash: 4137911f14563fdf7500159ee7a386d9c54bbdae
- hash: 441603f740667fd5b4365b880b55a6cb6991cd96
- hash: 6625f25a82a9739476402a759a514a59f822f5d8
- hash: d0f8b7885e65a2d0714f91f7275d100bca25a886
- hash: 3ecb8632582982f5ea4cef6b32ac468bd43c61896b5de57416c8100f8ab90102
- hash: 8448b5ff7fac8b65dd9e5056a8a4b3e4230b7b602f46e24f1667821a64a90e6e
- hash: d5a3321b215d2b141de7ebe24398cf43320a2016e4f20d079ddf7015ceb069a8
- hash: dad0ca56b3fe2aeb1f7908765f279db5fc33392caf4849c573a5d63bf7e15604
- ip: 222.122.49.15
- ip: 38.32.68.195
- url: http://japanroom.com/board/DATA/1288247428101.jpg
- url: https://www.genians.com/
- domain: japanroom.com
- email: tac@genians.com
- domain: www.genians.com
Pretexting-Based Targeted Intrusion: Analysis of Facebook Reconnaissance and Software Tampering Attacks
Description
APT37 conducted a sophisticated social engineering campaign utilizing Facebook accounts claiming locations in Pyongyang and Pyongsong, North Korea, to conduct reconnaissance and build trust with targets. After establishing relationships through Facebook Messenger, the threat actor migrated conversations to Telegram and employed pretexting tactics, claiming to share encrypted PDF documents containing military weapons information. Victims were persuaded to install a tampered Wondershare PDFelement installer that executed embedded shellcode for initial compromise. The attack chain delivered follow-on commands through a JPG-disguised payload hosted on a compromised Japanese real estate website. The malware abused Zoho WorkDrive OAuth2 APIs as C2 channels, exfiltrating screenshots, documents, system information, and audio files. The campaign employed multiple evasion techniques including code cave injection, process hollowing into legitimate dism.exe, XOR encryption layers, and fileless in-memory execution.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This threat involves a sophisticated pretexting-based intrusion by APT37 leveraging social engineering via Facebook and Telegram to deliver a tampered installer of Wondershare PDFelement that executes embedded shellcode for initial compromise. Follow-on payloads are disguised as JPG files hosted on a compromised Japanese real estate website. The malware uses Zoho WorkDrive OAuth2 APIs as covert command and control channels to exfiltrate screenshots, documents, system information, and audio files. Multiple evasion techniques such as code cave injection, process hollowing into legitimate dism.exe processes, XOR encryption layers, and fileless in-memory execution are employed to avoid detection. Indicators include multiple file hashes, IP addresses, URLs, domains, and an email address linked to the campaign. There is no CVE or patch information available, and no known exploits in the wild have been reported.
Potential Impact
The campaign enables initial system compromise through social engineering and tampered software installers, leading to unauthorized execution of malicious code. The attacker gains persistent access and exfiltrates sensitive data including screenshots, documents, system information, and audio files. The use of legitimate services (Zoho WorkDrive OAuth2 APIs) for command and control complicates detection and mitigation. The advanced evasion techniques increase the difficulty of identifying and removing the malware once infected.
Mitigation Recommendations
No official patch or remediation guidance is provided for this threat. Organizations should be aware of the social engineering tactics used and avoid installing software from untrusted or unexpected sources. Monitoring for indicators of compromise such as the provided file hashes, IP addresses, URLs, and domains can aid detection. Since this is a targeted intrusion using sophisticated evasion, endpoint detection and response solutions with behavioral analysis may help identify suspicious activity. Patch status is not yet confirmed — check vendor advisories and threat intelligence updates for any future remediation guidance.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.genians.co.kr/en/blog/threat_intelligence/pretexting"]
- Adversary
- APT37
- Pulse Id
- 69de00eccc0fa8439b871c56
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash085128b4e96633c82beb2101f5c525e4 | — | |
hash28d0143718153bf04c1919a26bb70c2d | — | |
hash36be2cbb59cd1c3f745d5f80f9aee21c | — | |
hashc637b3e7d74c2d678663454d16311b15 | — | |
hashc681fe3f42e82e9240afe97c23971cbc | — | |
hashd44a22d2c969988a65c7d927e22364c8 | — | |
hash4137911f14563fdf7500159ee7a386d9c54bbdae | — | |
hash441603f740667fd5b4365b880b55a6cb6991cd96 | — | |
hash6625f25a82a9739476402a759a514a59f822f5d8 | — | |
hashd0f8b7885e65a2d0714f91f7275d100bca25a886 | — | |
hash3ecb8632582982f5ea4cef6b32ac468bd43c61896b5de57416c8100f8ab90102 | — | |
hash8448b5ff7fac8b65dd9e5056a8a4b3e4230b7b602f46e24f1667821a64a90e6e | — | |
hashd5a3321b215d2b141de7ebe24398cf43320a2016e4f20d079ddf7015ceb069a8 | — | |
hashdad0ca56b3fe2aeb1f7908765f279db5fc33392caf4849c573a5d63bf7e15604 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip222.122.49.15 | — | |
ip38.32.68.195 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://japanroom.com/board/DATA/1288247428101.jpg | — | |
urlhttps://www.genians.com/ | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainjapanroom.com | — | |
domainwww.genians.com | — |
| Value | Description | Copy |
|---|---|---|
emailtac@genians.com | — |
Threat ID: 69de099282d89c981f185723
Added to database: 4/14/2026, 9:32:02 AM
Last enriched: 4/14/2026, 9:47:03 AM
Last updated: 4/14/2026, 1:46:39 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.