Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Pretexting-Based Targeted Intrusion: Analysis of Facebook Reconnaissance and Software Tampering Attacks

0
Medium
Published: Tue Apr 14 2026 (04/14/2026, 08:55:08 UTC)
Source: AlienVault OTX General

Description

APT37 conducted a sophisticated social engineering campaign utilizing Facebook accounts claiming locations in Pyongyang and Pyongsong, North Korea, to conduct reconnaissance and build trust with targets. After establishing relationships through Facebook Messenger, the threat actor migrated conversations to Telegram and employed pretexting tactics, claiming to share encrypted PDF documents containing military weapons information. Victims were persuaded to install a tampered Wondershare PDFelement installer that executed embedded shellcode for initial compromise. The attack chain delivered follow-on commands through a JPG-disguised payload hosted on a compromised Japanese real estate website. The malware abused Zoho WorkDrive OAuth2 APIs as C2 channels, exfiltrating screenshots, documents, system information, and audio files. The campaign employed multiple evasion techniques including code cave injection, process hollowing into legitimate dism.exe, XOR encryption layers, and fileless in-memory execution.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/14/2026, 09:47:03 UTC

Technical Analysis

This threat involves a sophisticated pretexting-based intrusion by APT37 leveraging social engineering via Facebook and Telegram to deliver a tampered installer of Wondershare PDFelement that executes embedded shellcode for initial compromise. Follow-on payloads are disguised as JPG files hosted on a compromised Japanese real estate website. The malware uses Zoho WorkDrive OAuth2 APIs as covert command and control channels to exfiltrate screenshots, documents, system information, and audio files. Multiple evasion techniques such as code cave injection, process hollowing into legitimate dism.exe processes, XOR encryption layers, and fileless in-memory execution are employed to avoid detection. Indicators include multiple file hashes, IP addresses, URLs, domains, and an email address linked to the campaign. There is no CVE or patch information available, and no known exploits in the wild have been reported.

Potential Impact

The campaign enables initial system compromise through social engineering and tampered software installers, leading to unauthorized execution of malicious code. The attacker gains persistent access and exfiltrates sensitive data including screenshots, documents, system information, and audio files. The use of legitimate services (Zoho WorkDrive OAuth2 APIs) for command and control complicates detection and mitigation. The advanced evasion techniques increase the difficulty of identifying and removing the malware once infected.

Mitigation Recommendations

No official patch or remediation guidance is provided for this threat. Organizations should be aware of the social engineering tactics used and avoid installing software from untrusted or unexpected sources. Monitoring for indicators of compromise such as the provided file hashes, IP addresses, URLs, and domains can aid detection. Since this is a targeted intrusion using sophisticated evasion, endpoint detection and response solutions with behavioral analysis may help identify suspicious activity. Patch status is not yet confirmed — check vendor advisories and threat intelligence updates for any future remediation guidance.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.genians.co.kr/en/blog/threat_intelligence/pretexting"]
Adversary
APT37
Pulse Id
69de00eccc0fa8439b871c56
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash085128b4e96633c82beb2101f5c525e4
hash28d0143718153bf04c1919a26bb70c2d
hash36be2cbb59cd1c3f745d5f80f9aee21c
hashc637b3e7d74c2d678663454d16311b15
hashc681fe3f42e82e9240afe97c23971cbc
hashd44a22d2c969988a65c7d927e22364c8
hash4137911f14563fdf7500159ee7a386d9c54bbdae
hash441603f740667fd5b4365b880b55a6cb6991cd96
hash6625f25a82a9739476402a759a514a59f822f5d8
hashd0f8b7885e65a2d0714f91f7275d100bca25a886
hash3ecb8632582982f5ea4cef6b32ac468bd43c61896b5de57416c8100f8ab90102
hash8448b5ff7fac8b65dd9e5056a8a4b3e4230b7b602f46e24f1667821a64a90e6e
hashd5a3321b215d2b141de7ebe24398cf43320a2016e4f20d079ddf7015ceb069a8
hashdad0ca56b3fe2aeb1f7908765f279db5fc33392caf4849c573a5d63bf7e15604

Ip

ValueDescriptionCopy
ip222.122.49.15
ip38.32.68.195

Url

ValueDescriptionCopy
urlhttp://japanroom.com/board/DATA/1288247428101.jpg
urlhttps://www.genians.com/

Domain

ValueDescriptionCopy
domainjapanroom.com
domainwww.genians.com

Email

ValueDescriptionCopy
emailtac@genians.com

Threat ID: 69de099282d89c981f185723

Added to database: 4/14/2026, 9:32:02 AM

Last enriched: 4/14/2026, 9:47:03 AM

Last updated: 4/14/2026, 1:46:39 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses