Summary
At Zscaler ThreatLabz, we have been closely monitoring the tools, techniques and procedures (TTPs) of APT37 (also known as ScarCruft or Temp.Reaper) - a North Korea-based advanced persistent threat actor. This threat actor has been very active in February and March 2023 targeting individuals in various South Korean organizations.
During our threat hunting research, we came across a GitHub repository which is owned by a member of the threat actor group. Due to an operational security (OpSec) failure of the threat actor, we were able to access a wealth of information about the malicious files used by this APT group along with the timeline of their activities dating as far back as October 2020.
Recently, Sekoia shared their findings of the toolset of APT37 here. In our blog, we disclose additional details which we found as a result of our in-depth investigation of the threat actor's GitHub repository.
The large number of samples we identified through the attacker's GitHub repository are not present on OSINT sources such as VirusTotal either. This allowed us to get more insights into this threat actor's previously undocumented attack vectors, motives, targets and the themes used.
In this blog, we will provide a high-level technical analysis of the infection chain, the new loaders we identified and a detailed analysis of the themes used by this APT group, discovered while reviewing the GitHub commit history. Even though the threat actor routinely deletes the files from the repository, we were able to retrieve all the deleted files and do an analysis of them.
Key points
APT37 is a North Korea-based advanced persistent threat actor which primarily targets individuals in South Korean organizations.
Its main objective is cyber espionage and it achieves this through data exfiltration of selected file formats of interest to the threat actor
It distributes the Chinotto PowerShell-based backdoor using various attack vectors.
We discovered the GitHub repository of APT37 and uncovered many previously undocumented attack vectors, artifacts and themes used by this group
File formats abused by APT37 include Windows help file (CHM), HTA, HWP (Hancom office), XLL (MS Excel Add-in) and macro-based MS Office files.
In addition to distributing malwares, this group is also focused on credential phishing attacks
The group has resumed its activity in the second half of Jan 2023 and since then is actively targeting users in South Korea through spear phishing emails
For C2 infrastructure, it often compromises South Korea-based bulletin board system (BBS) websites and uses them
The group is constantly evolving its tools, techniques and procedures while experimenting with new file formats and methods to bypass security vendors
Attack chain
There are multiple attack vectors used by APT37 in this campaign. Figure 1 and Figure 2 show 2 examples of the attack-chain. The other attack vectors we have described in the "Recent TTPs" section.
Figure 1: attack-chain using CHM file format to kick start the infection chain
Figure 2: attack-chain using the MS Office Excel add-in to kick start the infection chain
Opsec failure by APT37
Threat actor's GitHub repository overview
Our initial discovery was the GitHub repository of APT37 which was used to stage several malicious payloads. Figure 3 shows a preview of the threat actor's GitHub repository
Figure 3: GitHub account of the threat actor
The contents of the Readme file are chosen to appear as an Android software related repository. At the end of the Readme file, we noticed a base64-encoded string, preceded by a tag
While reviewing the commit history, we noticed that the threat actor often updates this encoded string. While we were not able to identify the exact usage of this encoded string, we believe it will be fetched by a payload on the endpoint.
Figure 4 shows a GitHub commit where the threat actor is updating the encoded token.
Figure 4: GitHub commit which shows threat actor updating the encoded token in the README
Recovery of deleted files
When we reviewed the commit history of the GitHub repository, we noticed that the threat actor frequently deleted malicious files from it. Figure 5 shows commit logs related to the delete events.
Figure 5: GitHub commit history showing the files being deleted routinely by the threat actor
We traced this commit history all the way to its origin, and observed that the first commit happened in October 2020. This was surprising to us since the threat actor was able to maintain a GitHub repository, frequently staging malicious payloads for more than 2 years without being detected or taken down.
Figure 6 shows the first commit in the commit history logs.
Figure 6: First commit in the GitHub account. Activity started in October 2020
Our next step was to retrieve all the deleted files from the GitHub repository. We have included the list of hashes and the original filenames in the indicators of compromise (IOCs) section.
Themes and target analysis
This wealth of information retrieved from the GitHub repository gave us a lot of insight into the types of themes used by the threat actor as social engineering lures and we were able to make an educated guess about the potential targets of the campaign.
Per our analysis of the file names, and the decoy contents, we have summarized the themes below along with examples. This is not an exhaustive list
Theme
Filename
Comments
Geopolitical
[INSS] National Security and Strategy (Winter 2022).rar
South Korean companies
LG유플러스_이동통신_202207_이_선.rar
SamsungLife.rar
Themes related to popular South Korean companies - LG and Samsung
Academic institutes
final exam questions 2022 summer KED.rar
2022 후기 신-편입생 모집요강.rar
Exam questions related to Korean Economic Development (KED)
Related to University of North Korean studies
Finance (income tax, general insurance)
WooriCard_20220401.rar
BoanMail.rar
WooriCard is a popular financial services organization in South Korea
Hanwha general insurance is a major insurer in South Korea
Examples of decoy themes
We have included below a few decoy themes used by the threat actor. These are samples not yet documented in the public domain. So, we hope to share more insights into the themes used in the campaign through this information.
Geopolitics
Figure 7 shows a decoy file related to INSS (Institute of National Security Strategy) in South Korea. This decoy PDF was sent along with a CHM file inside the archive file with the name: [INSS] National Security and Strategy (Winter 2022).rar
Figure 7: Decoy related to geopolitics theme
Education and academic institutes
Figure 8 shows a decoy file related to examination questions on the topic of Korean Economic Development
Figure 8: decoy related to education theme
Finance
Figure 9 shows a decoy file related to the Hanwha General Insurance - a major insurer in South Korea. This decoy file was sent along with the CHM file in an archive file - BoanMail.rar
Figure 9: decoy related to finance theme
Recent TTPs
Attack vector - CHM
It is well-known that APT37 uses a Chinotto PowerShell-based backdoor which is deployed on the endpoint through a malicious Windows help file (CHM). These CHM files are distributed inside archive files. Most of these archive files contain two components - the malicious CHM file and the decoy file to be displayed to the victim.
In most cases, the decoy files are password-protected. The password to open the decoy file is displayed by the CHM file.
Figure 10 below shows an example of code inside the CHM file which is responsible for displaying the decoy file to the victim, downloading a malicious HTA file from the attacker's server and executing it.
Figure 10: code inside the CHM file used to launch MSHTA and download HTA
New attack vector - MS Excel Add-in
So far in most of the campaigns of APT37 deploying Chinotto PowerShell backdoor, they have leveraged CHM files distributed inside archive files.
Interestingly, on March 15th 2023, around the time of our investigation, the threat actor uploaded a malicious Microsoft Excel Add-in to the GitHub repository. This Add-in is an XLL file. XLL files are DLLs which function as an add-in for the Microsoft Excel application.
We haven't seen this attack vector used by APT37 before and we believe this to be the first case being documented.
Technical analysis of the XLL file
For the purpose of technical analysis, we will use the XLL file with MD5 hash: 82d58de096f53e4df84d6f67975a8dda
XLL files get activated when they are loaded by the MS Excel application. There are various callback functions provided by Microsoft which allow the XLL file to communicate with the Excel application. One of the most common functions is xlAutoOpen() which is called as soon as the DLL is loaded and activated by the MS excel application.
Figure 11 below shows the code present in the XLL file in our case.
Figure 11: xlAutoOpen() subroutine of the malicious MS Office Excel add-in
Below are the main steps performed by this XLL file.
Extracts an XLS file from the entry called "EXCEL" in its resource section and drops it on the filesystem in the path: C:\programdata\20230315_SejeongSupport.xls
Displays the above dropped XLS file that is a decoy and used as a social engineering lure
Launches MSHTA to download an HTA file from the URL: hxxp://yangak[.]com/data/cheditor4/pro/temp/5.html
This HTA file contains the PowerShell backdoor called Chinotto
Ultimately, we see that the goal of this XLL file is also to deploy the Chinotto PowerShell backdoor. However, instead of using the CHM file, it now uses the XLL file.
Attack vector - LNK
We recovered some LNK files from the GitHub repository which were uploaded in August 2022 and apparently used in in-the-wild attacks around the same timeframe. These LNK files were present inside RAR archives. Along with the LNK file, an HTML file was present masquerading as a sign-in page of the South Korean company - LG.
The two LNK files we observed, both used dual extensions - "html.lnk" and "pdf.lnk".
These LNK files were used to execute MSHTA and download the malicious HTA file from the attacker's server. Rest of the attack-chain is similar to other cases which finally leads to the Chinotto PowerShell-based backdoor.
We analyzed the metadata of the LNK file with LECmd tool and noticed that both the LNK files were generated on a Virtual Machine running VMWare and with a Mac address of: 00:0c:29:41:1b:1c
Since the threat actor reused the same Virtual Machine to generate multiple payloads, this information could be useful for threat hunting and threat attribution purposes in future.
Figure 12 and 13 show the outputs of LECmd tool highlighting the target command executed by the LNK and other important metadata
Figure 12: LNK target command line and metadata extracted using LECmd
Figure 13: LNK machine details extracted using LECmd
Figure 14 shows the decoy HTML file which is packaged along with the LNK file inside the same archive.
Filename: LG유플러스_이동통신_202208_이_선.html
Translation: U+_Mobile_Communication_202208_Lee_Seon.html
Figure 14: decoy file related to LG
Attack vector - Macro-based MS office file
In March 2022, a macro-based MS office Word file was uploaded to the GitHub repository. This macro would launch MSHTA to download the PowerShell-based Chinotto backdoor as well. The target URL from where the HTA file is fetched is also the same as the previous case. This shows that the threat actor uses multiple initial file formats and attack vectors to deploy the same backdoor.
Filename: NEW(주)엠에스북스 사업자등록증.doc
Filename translation: NEW MS Books Business Registration Certificate.doc
Figure 15 shows the relevant VBA macro code.
Figure 15: VBA macro used to launch MSHTA to download the malicious HTA file
Attack vector - HWP file with embedded OLE object
Another attack vector used by APT37 to deploy Chinotto PowerShell-based backdoor on the endpoint is using HWP files with embedded OLE objects. These OLE objects contain a malicious PE32 binary which executes MSHTA to download a PowerShell-based backdoor from the C2 server.
When viewed with Hancom Office, the embedded OLE objects take the form of a clickable element in the document's body.
APT37 makes use of misleading bait images to entice the user to click on the OLE object elements, an action required to cause the execution of the malicious PE payloads inside these objects.
Figure 16 shows an example of such a document, as it appears in Hancom Office.
Figure 16: Malicious HWP document by APT37. The Korean-language dialog is fake - it’s in fact an OLE object represented by a static image of a dialog. When it’s clicked, a real dialog pops up - prompting the user to confirm the execution of the payload.
Rest of the attack-chain is similar to the previous cases.
For the purpose of technical analysis, we will consider the HWP file with MD5 hash: a4706737645582e1b5f71a462dd01140
Filename: 3. 개인정보보완서약서_북주협.hwp
Translated filename: 3. Personal Information Security Pledge_Bukjuhyeop.hwp
Figure 17 shows the OLE object stream present inside the HWP file.
Figure 17: malicious OLE object stream present inside the HWP file
Object streams in HWP files are zlib compressed. After decompressing, we extracted the PE32 binary from it.
MD5 hash of the extracted binary: d8c9a357da3297e7ccb2ed3a5761e59f
Filename: HancomReader.scr
PDB path: E:\Project\windows\TOOLS\RunCmd\Release\RunCmd.pdb
Figure 18 shows the relevant code in HancomReader.scr
Figure 18: Relevant code in HancomReader.scr used to download and execute the PowerShell backdoor
Zscaler sandbox detection
Figure 19 shows the HTA file detection in the Zscaler sandbox.
Figure 19: Zscaler Cloud Sandbox report
Figure 20 shows the detection for the macro-based MS Office Word file in Zscaler sandbox.
Figure 20 shows the macro-based document file detection in Zscaler sandbox.
In addition to sandbox detections, Zscaler’s multilayered cloud security platform detects indicators at various levels:
HTA.Downloader.Chinotto
VBA.Downloader.Chinotto
Win32.Backdoor.Chinotto
Conclusion
As we discussed in this blog, APT37 is a threat actor heavily focused on targeting entities in South Korea. It is constantly updating its tactics, techniques and procedures as is evident from the multiple file types used in the initial stages by it. The themes used by this threat actor range from geopolitics, current events, education to finance and insurance.
It is also particularly interested in current events and activities related to the Korean peninsula.
We will continue monitoring the activities of this threat actor and ensure our customers are protected against APT37.
Indicators of compromise
Archive file hashes
MD5 hash
Archive filename
3dd12d67844b047486740405ae96f1a4
(20220120)2022년 총동창회 신년인사001.rar
e9cd4c60582a587416c4807c890f8a5b
(양식) 제20대 대통령 취임식 재외동포 참석자 추천 명단(국민의힘당원 000).rar
6dc7795dde643aae9ced8e22db335ad1
1.rar
e3879ea3f695706dfc3fc1fb68c6241d
2017-APEC.rar
17bc6298bf72fa76ad6e3f29536e2f13
2022 후기 신-편입생 모집요강.rar
54a99efd1b9adec5dc0096c624f21660
2022-01-27-notification.rar
f3f4cf7876817b1e8a2d49fe9bd7b206
2022-03-22.rar
bb182e47e1ffc0e8335b3263112ffdb1
2022-04-14.rar
9d85c8378b5f1edefb1e9837b3abb74f
2022.04.27.rar
cb33ef9c824d16ff23af4e01f017e648
2022.rar
75fe480a0669e80369eaf640857c27cd
20220315-112_Notice.rar
6db5f68b74c8ba397104da419fcc831d
202203_5_06.rar
cfd73942f61fbb14dded15f3d0c92f4a
20220510_115155.rar
5c67c9266e4267d1bf0862bf2c7bd2a5
20220913.rar
1531bba6a8028d38d36c0a91b91159c3
20220916093205755684_TSA.rar
afdc59ec36ac950de08169162783accd
2022년 국방부 부임이사 안내(몽골리아).rar
06c112968cdde43c3424bdf0a2a00928
20230302_Guide.rar
6ab401c83095129a182b9be0359d602d
3사복지업무.rar
93e94b673c6d1ea6d615c0102dc77610
Ambassador Schedule Week 6 2023.rar
e32f59fd5acbe01d2171ba6c2f24e3ca
Announcement.rar
7b60dc663e1025e8892b96fa9fc34f00
BoanMail.rar
5e95023c6ac3f3fefe00cfc2b4b1d093
CR_20230126.rar
353370ade2a2491c29f20f07860cf492
CV.rar
120a677df1c4d1f0792b6547d3b60183
DBLife-2022_08_05.rar
02baa23f3baecdc29d96bffea165191b
Details.rar
c3325c43b6eea2510f9c9f1df7b7ce22
Documents.rar
04a7290e04fd1855140373aa3d453cef
DriverSet.rar
87c3e8e4308aac42fed82de86b0d4cb6
Estimate.rar
328dc6e7acce35abaaf3811bac2bc838
H2O 견적서.rar
e9230cf7615338ab037719646d67351b
HealthDoc.rar
cf012ca48b5e1f6743be7e0d10cdfd2e
Introduce.rar
34d3e5306cff0bfe831ccd89d095ef33
Invoice_1514_from_Evo3_Marketing_Inc.rar
717dab257423d5fd93d0d02f3ff242e7
KB_20220111.rar
0164d8a2d27cfd312fb709c60c351850
KB_20230126.rar
c23c17756e5ccf9543ea4fb9eb342fde
KN0408_045 정영호.rar
31793153b12f1187287007578017abd4
KakaoTalk_20220419_103447534.rar
030df9bca0a35bcd88d5897482ee226d
LG유플러스_이동통신_202207_이_선.rar
8eb56493d984b3c2fa4c2dedb6871dd7
LG유플러스_이동통신_202208_이_선.rar
0c2375825dcae816a1f9b53f8f82d705
MAIL_20230125151802.rar
93817f6dfe3a7596eeef049eda9c8b18
Message.rar
3fe6722cd256d6d5e1d5f5003d6a01a5
NTS_eTaxInvoice.rar
c1b6390f0ef992571fa9ed3c47eb0883
News about Foreign affairs, The High North and Ukraine.rar
6dc7795dde643aae9ced8e22db335ad1
Oxygen_Generator.rar
3b52f149e220da28bf9cd719570979ce
Payment.rar
e5c509a33db926f3087c3a52546b71f2
Provincil's letter.rar
d5ad2c1790c715d88b5e05ca4329417d
References.rar
4d27d6b01f85a4b40650e6bc7cc18ed3
SamsungLife.rar
3a4f4b1fb30fbb70c14dea600a56ca68
SecureMail.rar
5a8bdfb0008767cdb05dfcc3223e9a70
TermsOfService.rar
881ccfd6c11b774b80b304ab78efef53
Transaction.rar
f2be2c1e80769a45761d0b69a46a627f
TransactionGuide.rar
f7a73eaf15ee8d8f3257a359af5987eb
WooriCard_14day_20220609.rar
b6c4137868e2c305241093e967b2d60b
WooriCard_20211222.rar
715d408b45e5334a985e7e6279fa80ac
WooriCard_20220401.rar
b2ce0ba21ae1e982a3a33a676c958bec
XQQ-2022-D27.rar
b9f423b42df0df0cb5209973345d267c
[INSS] National Security and Strategy (Winter 2022).rar
ab0dc3964a203eea96a233c8d068de95
[붙임] 제20대 대통령선거 제1차 정책토론회 시청 안내문.rar
fbc339cd3f4d39af108b4fdb70202b22
boanmail-202101-j08.rar
fbc339cd3f4d39af108b4fdb70202b22
boanmail_202201_2_505824.rar
0db43beb06845026cf33c59baa66b393
boanmail_202201_5_02-10424.rar
237bcbe07219eb24104815205cc01d24
boanmail_202201_5_80222982.rar
2bf05e2526911b3bdb7f77cbbe4155f3
db-fi.rar
0923c69808352feb9a57a766c611b7d4
dbins_secure.rar
8c3bb54dcd4704a0f0b307863345c5d1
email_1649225531086.rar
0947efee85596a17bdd1e798826d48aa
enkis.rar
93675086f33fb0708982eafea5568f05
final exam questions 2022 summer KED.rar
8faabae5e6766a6a93a56014cca5c295
hi_security_mail.rar
9e7099b32f6bd36724a71f6c3cb21d17
issue.rar
9c6d553682813724424a7fcc7af8729d
mmexport1638437859483.rar
6da10cc37edee7e16c520f2f95cd9304
pay_202111_5_00-10290.rar
f07a3d146f32bfa8f53e5cae7178559e
pay_202111_5_01-10104.rar
0beeb858734cd7da03b1284e7fe00b22
pay_202111_5_02-12972.rar
8c4cbe900cf69c739882cef844b1ac11
pay_202111_5_04-10220.rar
31da11dbf80715138261904b2249a7f8
pay_202111_5_04-14213.rar
1803d81e1d0ccb91c752ecb4bc3b6f0c
pay_202111_5_12-11985.rar
06b7207879bd9ed42b323e16bb757a3c
pay_202202_5_06-10325.rar
28b807be70e49ebc0c65455f430d6408
pay_202205_5_01-10104.rar
c97a32c7555fc81f296fee0a65fec079
pay_202209_5_01-502479.rar
1e05dbe1846c1704b9a7a1db13fdd976
samsungfire.rar
38d9ff50b68144a9a40d1e7e3d06adb0
security-guide.rar
f0b7abea21984790d2906adf9653c542
securityMail.rar
04802790b64d66b9257ae119ee7d39a5
security_20220813.rar
a8bcbb34e11d7b23721ec07eadb5ddc5
shinhancard_20220218.rar
eecf78848dde0d41075e35d3aa404697
제39기 모집요강 및 입학지원서-재송.rar
ef5aa1dfbfc4c9128a971e006da0cb8b
새로 바뀐 COVID-19 시기 자가격리 정책.rar
e5865d8cee159ac02ee53ef52f4058ac
오피스 365 + 설치설명서 입니다.rar
882d4d6528404c3ceacee099f59bfab4
텅스텐 W 99.rar
b7275a3931fb85f723a4ceec9478c89e
다문화 문제 답.rar
f96fa367261df9cc2b021318ce361ec6
취임식 관련 자료.rar
8d7141882a95be5dcfa8ce90d7079541
공고문(기술관리).rar
ff2ccc12007bbf3f5934a5dfdc8430ee
황선국-차예실의 요르단 이야기-34.rar
3c3fc3f47abf0ec7a3ab797b21b123e2
공고문.rar
acf9bad00bc1d2649ad918b0524c7761
계약사항 안내문.rar
cb33ef9c824d16ff23af4e01f017e648
문의사항.rar
802bf381dd7f7f6cea077ab2a1814027
보안메일.rar
89d1888d36ff615adf46c317c606905e
협조요청.rar
0d15b99583b3b9638b2c7976b4a1d2ef
통일교육11.rar
8113798acc4d5690712d28b39a7bb13a
백산연구소 (830 LNG) 22.01.17.rar
4987ed60bb047d4ca660142b05556125
백산연구원 소방서.rar
b840485840480d42b3b8e576eecdf2ee
제로깅크루_명단.rar
e8ab4f80ebad24260869e89bca69957d
폴리프라자Ⅲ, 4월 근무 현황.rar
87aaf50fc5024b5e18f47c50147528b4
조성호기자님_마키노기자책소개.rar
11b0c0577e12400cddc7b62b763a1dd1
사업유치제의서-PC모듈러pdf.rar
fa797b29229613f054378c8a32fcefbc
통일미래최고위과정_입학지원서.rar
CHM file hashes
MD5 hash
Filename
914521cb6b4846b2c0e85588d5224ba2
(20220120)2022 - 001.chm
2ffcb634118aaa6154395374f0c66010
(양식) 제20대 대통령 취임식 재외동포 참석자 추천 명단(국민의힘당원 000).chm
24daf49d81008da00c961091cbfc8438
0-Introduction.chm
624567dae70fc684b2a80b5f0f1de46d
1.Brefing.chm
2ab575f9785239d59395ec501ceaec2e
2017 - APEC.chm
684a61eedb2ec26d663c3d42a107f281
2022 - Guide.chm
a48ac5efd350341beab9a4fdfb7f68d7
2022-01-27-notification.chm
030c3873f1a45eab56dca00fa8fa9a14
2022-04-14.chm
a6b30fc17d6ff9aa84fb93c3f05a4171
2022-06-24-Document.chm
b4adb4fede9025f6dd85faac072a02e7
2022-Important.chm
b2d7c047dc1c7fb7074111128594c36e
2022.04.27.chm
edb87c2cabcc402173fa0153f4e8ae26
2022.chm
d020d573d28e3febb899446e3a65e025
20220315-112_Notice.chm
7058661c3f944f868e5a47c4440daa9b
20220510_115155.chm
d431c37057303e5609f0bffa83874402
20220623103203983_6_조사표_기업용.chm
820d302655d5cd5dd67859f7a5cb74fe
20220913_Main.chm
8db5578f5245c805c785ae38ea8a1363
20220916_Password.chm
c29d11961b9662a8cb1c7edd47d94ae5
20230302_Guide.chm
cae4d578b1bdaa4e193095f035cecbc6
Account Information.chm
9bf4576a1381c15c08060ca6cfd59949
BoanMail.chm
c0bfb9f408263c1bc574a08fa164a61f
BookBriefing.chm
e9562655c36d46f4b6534f189ae453a0
Content-Introducing.chm
6bd63cf73cab3305686f2ee41d69bd42
Covid-19-Notice20211028.chm
012f0dd04c9c810c14cdde08cfbca3c5
DBLife-2022_08_05.chm
00a7c9ad2e975e19034838a14f73a46a
Details.chm
77a6f57ccefeda14d5faf44cc37b69da
Estimate.chm
211b412fe5c4b207eb39384499b93342
H2O Note.chm
3a23ee36f792e241772e81aeeccf8aa8
Introduce.chm
532ec6d88c728afecfcf8fbb38fb8add
Invoice_1514_from_Evo3_Marketing_Inc.chm
2a982b843cf92081fc4202e11a1f7234
KB_20220111.chm
aa68044e16a115af4ea1de3d062c4e41
KB_20230126.chm
0bf53a165b2bd64be31093fefbb9fb51
KakaoTalk_20220419_103447534.chm
f11b9fb8208b9949859785810f251334
KakoBank-N202111.chm
097edc04368d411593fff1f49c2e1d9c
LG유플러스_이동통신_202207_이_선.chm
45bd3001517f5e913ddde83827f4cc29
MAIL_20230125151802.chm
0bf993c36aac528135749ec494f96e96
Message.chm
549162b9ec4c80f9a0ca410ff29c8e98
NTS_eTaxInvoice.chm
c09939e972432968976efc22f556bd0f
News about Foreign affairs, The High North and Ukraine.chm
79d5af9d4826f66090e4daf6029ed643
Password.chm
9e1a2b331fd1e4ee77880d8f62025cd1
Password12.chm
5f2dcb1e51c8d574f43c8f7c7f84d9fa
Related to the inauguration ceremony.chm
a5ce8fe31da94fdea9c25f3abcdd5982
SamsungLife.chm
8a74a931e6ed4ae477547707da2fd76c
SecureMail.chm
0012f5bfe97421d39751eb20d857ae09
TermsOfService.chm
22652b383d9ea880a4644a35cd5fadaf
Transaction.chm
73715c82e31702f56858226557f98444
WooriCard_14day_20220609.chm
b34761f5272c9109c47780f415d28631
WooriCard_20211222.chm
2c697d27cd2e455ae18b6744a47eef4f
WooriCard_20220401.chm
2cf2805529ebc68884979e582e12cf8d
XQQ-2022-D27.chm
67cc91e889b4a597a6486db0e92fa4d1
[INSS] Briefing and Guide.chm
1f4038a9c6266b60f784c37efbb832f5
[붙임] 제20대 대통령선거 제1차 정책토론회 시청 안내문.chm
ac7f8e5245f9736a1323509a537e54eb
baeksan (830 LNG) 22.01.17.chm
ee06a0d6e5645248db88c279ec0e8624
contents.chm
a13fb4e11b31d109a1b145f20ea4b929
db-fi.chm
0fb698efce9476c3f2b603b30f5e35d5
dbins_secure.chm
d942353d15077352dcae83dd04869e1a
email_1649225531086.chm
ac51f29d609c73cce8db67c86aa49ba0
enkis_choe.chm
7f030cbf7ce41b9eb15693ee92b637a5
hi_security_mail.chm
a85dc5403cb1fe7d0ae692a431e1eae3
issue.chm
5e2e5b71503adedf786bc69f3849750f
jungsan_202203_5_06-10325.chm
7cba0c911b74d889f05f8b954926aa67
jungsananne_202201_2_505824.chm
174ae3db1dd4c61037bc7a5bf71d1366
jungsananne_202201_5_02-10424.chm
498b20e20af190c6650f03e8adf9a5b7
jungsananne_202201_5_80222982.chm
92974d1677fa840fcc3d6599df86d38f
mmexport1638437859483.chm
19c0583e57385f574c9986de6a26adae
pay_202111_5_00-10290.chm
e73b6c906f1070d569a0e9b70304be01
pay_202111_5_01-10104.chm
b1d2c6233d56ef3aeaa08cff7a7d2971
pay_202111_5_02-12972.chm
c0d25429f924016765711cd860fd03f9
pay_202111_5_04-10220.chm
8a5e7f281b51c2b9e364c26e3f699019
pay_202111_5_04-14213.chm
faf6139671f07db49056f4e0470ab188
pay_202111_5_12-11985.chm
a372e8dfd1940ef4f9e74095a8bf3bd7
pay_202201_2_505824.chm
561b29a5650ff7fe6e63fa19c29ee240
pay_202201_5_02-10424.chm
093ad28a08314e8fe79c26828137ab0a
pay_202201_5_80222982.chm
d32ccdcf79932dd9d7eaf4fd75bfade2
pay_202202_5_06-10325.chm
deed5eb8b19dae07720e97b485a5f1e4
pay_202203_5_06-10325.chm
886702585a3951882801b9eecb76c604
pay_202205_5_01-10104.chm
6ac4b333e6d7f64aee5c32e20d624f2e
pay_202209_5_01-502479.chm
441adf67527915c09cfe29727b111a6a
samsungfire.chm
122208301a3727c5fc7794ff0f7947bf
security-guide.chm
79e158af8ded991ee95a0f10654576ce
securityMail.chm
e7104d3e388530a43623981138112e03
security_20220813.chm
af89179ef2c8365ca413fed8553159fa
shinhancard_20220218.chm
b7b1095620b8629c73191d5c05afc446
z email content.chm
681a21cb83e82da88f42f9fb0dd764b6
다문화 문제 답-추가.chm
5f2dcb1e51c8d574f43c8f7c7f84d9fa
취임식 관련 자료.chm
72a38aa3e128d2ffca141a41a4101dca
황선국-차예실의 요르단 이야기-34.chm
632104e97870c1177c211f5e2d963b75
요약문.chm
ffba3072600a1f06d260137f82371227
공지사항.chm
e557693cc879beeb1a455cac02724ea7
보안메일.chm
71389f565a5ebe573c94d688fa6f23ea
통일교육11.chm
920ccffa488d2b0e9aa19acc5f31fc3a
제로깅크루_명단.chm
7c53f15614d5f9cf2791cb31811893a7
폴리프라자Ⅲ, 4월 근무 현황.chm
fb60a976bbed174effa6081a35abee87
사업유치제의서-목차.chm
bca3f0b4a5a1cbcd3efa1ca0df7f0d4b
통일미래최고위과정_입학지원서.chm
LNK files
MD5 hash
Filename
eb7a6e3dc8bbc26f208c511ec7ee1d4c
LG유플러스_이동통신_202208_이_선.html.lnk
c5f954436e9623204ed961b9b33e769d
계약사항 안내문_1.pdf.lnk
Appendix
# Please note that most of the HWP files mentioned below are clean decoy files used by the threat actor. The original filenames are included to give the reader insights into the themes used.
MD5 hash
Filename
808fda00b7aa114182ba0ad9668ad4fb
(227183-F)_사업진행상태보고서.hwp
6566697d2b2b7b562f3e4f74986ae341
1.일반설계기준.hwp
70b327e1a2cf7863004436080848eddc
2020_normal_ko.hwp
b8addd3c9e0c7f1ed8d4aafcb582e755
2021년 ICT융합 스마트공장 구축 및 고도화 사업 최종감리보고서(엠플러스에프엔씨, 인버스, 정찬혁)_초안.hwp
07ad22218f9dc7da63b880ae5a65a177
2022년 외국인 주민교류를 통한 기술인으로 진로 직업지도사업.hwp
de5319b8a5674994e66b8668b1d9884f
220915 수정.hwp
a4706737645582e1b5f71a462dd01140
3. 개인정보보완서약서_북주협.hwp
d49ef08710c9397d6f6326c8dcbf5f4e
3사복지업무홍보.hwp
96900e1e6090a015a893b7718d6295dd
K-MOOC 수기 공모 이벤트.hwp
b35c3658a5ec3bd0e0b7e5c6c5bc936f
RFQ_소각 및 발전설비 건설공사-보고-0614-Ver1.hwp
0ccb1c52b3de22b49756a2608cddd2e9
UN 대북제재위원회 전문가 패널 보고서.hwp
d891219a50b17724228f9ae8c7494bbf
UN 대북제재위원회 전문가 패널 보고서」요약.hwp
cac2d25c8e173c896eff0dd85f09c898
[붙임] 제20대 대통령선거 제1차 정책토론회 시청 안내문-복사.hwp
ad922c7f0977c4aefcbc2c089cce8b66
제39기 모집요강 및 입학지원서-재송.hwp
48153ac26eb10473b60e4011f5e004e9
제8회 전국동시지방선거 제1차 정책토론회 시청 안내.hwp
0de54a8109f54c99d375fc0595649175
논문 자료.hwp
0de54a8109f54c99d375fc0595649175
사업 제안.hwp
bf478b6b500c53e05741e3955630182f
오피스 365 + 설치설명서 입니다.hwp
7b29312a0f8d9a7d2354843f7c9c21ea
텅스텐 W 99.hwp
6b8acab4941dcfb1dbe04bc9477e7605
다문화 문제 답(12. 5 업데이트).hwp
8591125c0a95f8c1b1e179901f685fa3
인터뷰(22. 9. 14).hwp
f1bd01dc27fe813aeade46fe55bd9e2e
황선국-차예실의 요르단 이야기-34.hwp
ff072f99ea6d04c0a4ff0ab9d23440fc
접수증-삼주글로벌 법인세 신고서 접수증.hwp
35f9802b98105fa72ec34d2b02649655
공고문.hwp
5228e631cdd94ec8d8c9d68e044236f1
위임장.hwp
5bdd6ad0c17ee2a1057bf16acb86f371
확인서.hwp
c09bedb49199b09bcb362ba5dadcd22a
함께가는 평화의 봄_과업지시.hwp
a2aeb5298413c2be9338084060db3428
동남아와 국제정치(기말레포트).hwp
f8f994843851aba50ca35842b4cca8a3
행사안내.hwp
6deceb3e2adff0481b30efe27e06542e
백산연구원 소방서 제출용.hwp
0fd7e73e6672adaa1e5cf2dfca82e42e
서식1, 4 강사이력서 및 개인정보동의서_북주협.hwp
e5afbbfa62efd599a1ab2dade7461d62
폴리프라자Ⅲ, 4월 근무 현황.hwp
2e57c30259e5c33779940ce9a9f91378
산업가스용도.hwp
c775aef36bc4b1b9a2b14fae46521c0e
서영석고객님.hwp
aa84bdaf877d70c744ce1982395ad37c
자문결과보고서(양식).hwp
19dabc553ee3c3bcd166411365e2dd56
비대면_서비스_보안_취약점_점검_신청서.hwp
6bf6de967ca6324106a0700715a9e02b
중고맨거래명세서.hwp
0bcda05d3f4054dd5fb571a634afe10a
정기총회안내공문_2022.hwp
68603ba44b58f4586deeb571cf103e0c
통일미래최고위과정_입학지원서_양식.hwp
670f8697d7c46757745be0322dfdd2ab
노원도시농업네트워크.hwp
c47428fe38bec9424b75aa357113d9dc
사단법인 공문 (2022.12호)_2022년도 평화통일교육사업 함께가는 평화의 봄.hwp
↧