Nov. 30, 2023, 12:11 a.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news

AhnLab Security Emergency response Center (ASEC) has recently identified that the Kimsuky threat group is distributing a malicious JSE file disguised as an import declaration to research institutes in South Korea. The threat actor ultimately uses a backdoor to steal information and execute commands.


The file name of the dropper disguised as an import declaration is as follows.



  • Import Declaration_Official Stamp Affixed.jse


The file contains an obfuscated PowerShell script, a Base64-encoded backdoor file, and a legitimate PDF file.



Figure 1. …

actor ahnlab asec backdoor center declaration disguised dropper emergency fake file import information kimsuky korea malicious malware analysis name research response security south south korea steal threat threat actor threat group ultimately

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC