Spear-phishing emails containing a password-protected .7z archive to bypass automated email security scanners. Malware Type: Infostealer / Backdoor. Infection Chain
: Often utilize legitimate-looking but compromised domains or dynamic DNS services. Tails and Pines.7z
: Inside the archive is usually a malicious executable or a shortcut file ( .lnk ) disguised as a PDF or Word document. Spear-phishing emails containing a password-protected
: Once opened, the malware executes a script (often PowerShell or VBScript) that establishes persistence on the host. : Inside the archive is usually a malicious
The file is associated with the Pines and Tails campaign, a sophisticated cyber-espionage operation likely linked to the North Korean threat actor group Kimsuky (also known as APT43 or Thallium) . Technical Summary
: The malware collects system information, browser credentials, and specific document types, sending them to a Command and Control (C2) server. Key Indicators of Compromise (IoCs)