KONNI Adopts AI to Generate PowerShell Backdoors #1797
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Check Point Research (CPR) analyzes an ongoing KONNI (North Korea–linked; active since at least 2014) phishing campaign pivoting from traditional geopolitics-themed spearphishing to targeting software developers/engineering teams—especially those with blockchain/crypto access—in APAC (samples uploaded to VirusTotal from Japan, Australia, India). The objective is to compromise developer endpoints to reach higher-value assets: infrastructure access, API credentials, wallet access, and potentially ...
🔧 Technical Details
Weaponized
.LNKlaunchers can embed secondary payloads (e.g., a DOCX lure and a CAB) and use an embedded PowerShell loader to decode and drop them; a follow-on BAT can establish persistence withschtasksand execute a stored PowerShell backdoor in-memory by reading encrypted bytes from disk, XOR-decrypting them with a single-byte key (e.g.,'Q') and running the decoded script viaiex, then self-deleting the BAT to reduce the initial execution artifact.Arithmetic-based PowerShell obfuscation can hide strings by generating characters at runtime using sums/subtractions of numeric literals (ASCII reconstruction), concatenating them into “dictionary” variables, and finally reconstructing the real logic by substring indexing before executing it with
IEX—making static analysis harder while still allowing full runtime execution.Anti-analysis gating in commodity PowerShell implants can combine (1) minimu...
🤖 Agent Actions
Summary:
CurVer/extension-basedfodhelper.exeUAC bypass variant to the UAC guide, including HKCU-only registry steps and post-elevation actions used in the KONNI campaign.Tests:
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.