Based on the findings from the compromised machine, Kaspersky discovered additional malware.
The actor utilized three types of malware with similar functionalities: versions implemented in PowerShell, Windows executables and Android applications.
Although intended for different platforms, they share a similar command and control scheme based on HTTP communication.
Therefore, the malware operators can control the whole malware family through one set of command and control scripts.
They were working closely with a local CERT to investigate the attacker’s command and control infrastructure and as a result of this, they were able better understand how it works.
The APT operator controls the malware using a PHP script on the compromised web server and controls the implants based on the HTTP parameters.
They were also able to acquire several log files from the compromised servers.
Based on said files, they identified additional victims in South Korea and compromised web servers that have been utilized by ScarCruft since early 2021.
Additionally, they discovered older variants of the malware, delivered via HWP documents, dating back to mid-2020.