PULSE NAME
Pretexting-Based Targeted Intrusion: Analysis of Facebook Reconnaissance and Software Tampering Attacks
WHITE APT37 AlienVault 2026-04-14 Modified: 2026-04-14
21
IOCs
MEDIUM VOLUME
APT37 conducted a sophisticated social engineering campaign utilizing Facebook accounts claiming locations in Pyongyang and Pyongsong, North Korea, to conduct reconnaissance and build trust with targets. After establishing relationships through Facebook Messenger, the threat actor migrated conversations to Telegram and employed pretexting tactics, claiming to share encrypted PDF documents containing military weapons information. Victims were persuaded to install a tampered Wondershare PDFelement installer that executed embedded shellcode for initial compromise. The attack chain delivered follow-on commands through a JPG-disguised payload hosted on a compromised Japanese real estate website. The malware abused Zoho WorkDrive OAuth2 APIs as C2 channels, exfiltrating screenshots, documents, system information, and audio files. The campaign employed multiple evasion techniques including code cave injection, process hollowing into legitimate dism.exe, XOR encryption layers, and fileless in-memory execution.
Indicators of Compromise (21)
All FileHash-MD5 FileHash-SHA1 FileHash-SHA256 IPv4 URL domain email hostname
TYPEINDICATORDESCRIPTIONCREATED
FileHash-MD5 085128b4e96633c82beb2101f5c525e4 2026-04-14
FileHash-MD5 28d0143718153bf04c1919a26bb70c2d 2026-04-14
FileHash-MD5 36be2cbb59cd1c3f745d5f80f9aee21c 2026-04-14
FileHash-MD5 c637b3e7d74c2d678663454d16311b15 2026-04-14
FileHash-MD5 c681fe3f42e82e9240afe97c23971cbc 2026-04-14
FileHash-MD5 d44a22d2c969988a65c7d927e22364c8 2026-04-14
FileHash-SHA1 4137911f14563fdf7500159ee7a386d9c54bbdae 2026-04-14
FileHash-SHA1 441603f740667fd5b4365b880b55a6cb6991cd96 2026-04-14
FileHash-SHA1 6625f25a82a9739476402a759a514a59f822f5d8 2026-04-14
FileHash-SHA1 d0f8b7885e65a2d0714f91f7275d100bca25a886 2026-04-14
FileHash-SHA256 3ecb8632582982f5ea4cef6b32ac468bd43c61896b5de57416c8100f8ab90102 2026-04-14
FileHash-SHA256 8448b5ff7fac8b65dd9e5056a8a4b3e4230b7b602f46e24f1667821a64a90e6e 2026-04-14
FileHash-SHA256 d5a3321b215d2b141de7ebe24398cf43320a2016e4f20d079ddf7015ceb069a8 2026-04-14
FileHash-SHA256 dad0ca56b3fe2aeb1f7908765f279db5fc33392caf4849c573a5d63bf7e15604 2026-04-14
IPv4 222.122.49.15 2026-04-14
IPv4 38.32.68.195 2026-04-14
URL http://japanroom.com/board/DATA/1288247428101.jpg 2026-04-14
URL https://www.genians.com/ 2026-04-14
domain japanroom.com 2026-04-14
email tac@genians.com 2026-04-14
hostname www.genians.com 2026-04-14