Skip to content

WARNING

Disclaimer: This is OSINT summarized by AI. Trust, but verify.

Lazarus Group — Comprehensive Threat Actor Profile

Date: 2026-04-02 Author: AEGIS Research Agent Classification: TLP:AMBER Severity: Critical


Executive Summary

Lazarus Group (also tracked as HIDDEN COBRA, Diamond Sleet, ZINC, Labyrinth Chollima, NICKEL ACADEMY, and Guardians of Peace) is a North Korean state-sponsored advanced persistent threat (APT) group attributed to the Reconnaissance General Bureau (RGB). Active since at least 2009, Lazarus has evolved from destructive operations and espionage into one of the most financially motivated nation-state actors in the world. The group is responsible for the largest cryptocurrency heist in history — the $1.5 billion Bybit breach in February 2025 — and has expanded into ransomware-as-a-service (Medusa), open-source supply chain attacks targeting developer ecosystems (npm, PyPI, GitHub), and sophisticated social engineering campaigns (Operation Dream Job, Contagious Interview). Lazarus subgroups include Andariel (Stonefly), APT38, BlueNoroff (TraderTraitor), and Citrine Sleet. Their operations fund DPRK weapons programs and generate revenue estimated in the billions annually.


Background & Attribution

  • Country of Origin: Democratic People's Republic of Korea (DPRK / North Korea)
  • Sponsoring Entity: Reconnaissance General Bureau (RGB), DPRK's primary intelligence agency
  • Active Since: At least 2009
  • Primary Motivations: Financial gain (cryptocurrency theft, ransomware), espionage (defense, aerospace, nuclear), destructive operations
  • Alternative Names: HIDDEN COBRA (US-CERT), Diamond Sleet (Microsoft), ZINC (Microsoft legacy), Labyrinth Chollima (CrowdStrike), NICKEL ACADEMY (SecureWorks), Guardians of Peace, Group G0032 (MITRE)

Key Subgroups

SubgroupFocusNotable Operations
BlueNoroff / TraderTraitorCryptocurrency & financial institutionsBybit heist ($1.5B), Bangladesh Bank ($81M), AppleJeus
Andariel / StoneflyEspionage & ransomwareMedusa ransomware, defense/tech targeting
APT38Banking SWIFT network attacksMultiple bank heists worldwide
Citrine Sleet / Gleaming PiscesDeveloper supply chain & cryptoPondRAT, ThemeForestRAT, Operation 99

FBI Wanted List & Indicted Members

Three members of Lazarus Group have been indicted by the U.S. Department of Justice and are featured on the FBI's Cyber Most Wanted list. All three are members of the DPRK's Reconnaissance General Bureau (RGB) military intelligence service.

NameAge (at indictment)FBI Wanted PageChargesKey Attacks
Park Jin Hyok~36FBI WantedConspiracy to Commit Wire Fraud & Bank Fraud; Conspiracy to Commit Computer-Related Fraud (Computer Intrusion)2014 Sony Pictures hack, 2016 Bangladesh Bank heist ($81M), 2017 WannaCry ransomware
Jon Chang Hyok~31FBI WantedConspiracy to Commit Wire Fraud & Bank Fraud; Conspiracy to Commit Computer-Related Fraud (Computer Intrusion)ATM cash-out schemes, cryptocurrency theft, fraudulent blockchain applications
Kim Il~27FBI Cyber Most WantedConspiracy to Commit Wire Fraud & Bank Fraud; Conspiracy to Commit Computer-Related Fraud (Computer Intrusion)Bank heists in Asia and Africa, cryptocurrency theft schemes

Additional Charges:

  • The three are alleged to have stolen or extorted more than $1.3 billion in cash and cryptocurrency
  • Schemes included a $6.1 million ATM heist from Bank Islami in Pakistan
  • Used fake interbank (SWIFT) messages to attempt theft from financial institutions in Bangladesh, Vietnam, Taiwan, Mexico, Malta, and several African countries
  • Created the WannaCry 2.0 ransomware used to extort companies and the UK's National Health Service

Associated Money Launderer:

  • Ghaleb Alaumary (37, Mississauga, Ontario, Canada) — pleaded guilty to money laundering for North Korean schemes including ATM cash-outs, BEC attacks, and other fraud. Organized teams of co-conspirators in the US and Canada to launder millions for the DPRK regime.

All three North Korean operatives remain at large and are considered fugitives by the U.S. Department of Justice. Park Jin Hyok reportedly worked for Chosun Expo Joint Venture, a North Korean front company operating in Dalian, China.


Recent Campaigns & Activity (2025–2026)

1. Bybit Cryptocurrency Heist (February 2025)

The largest cryptocurrency theft in history. Lazarus (via the TraderTraitor subgroup) compromised Safe{Wallet}'s development infrastructure through a supply chain attack, stealing approximately 401,000 ETH (~$1.5 billion).

Attack Chain:

  1. Social engineering of a Safe{Wallet} developer — compromised workstation
  2. Stole AWS session tokens to access Safe{Wallet}'s infrastructure
  3. Injected malicious JavaScript into the Safe{Wallet} UI bundle (_app-52c9031bfa03da47.js)
  4. Malicious code monitored for Bybit signer addresses, then replaced transaction parameters
  5. Bybit operators approved what appeared to be legitimate transactions, but recipient addresses were replaced with attacker-controlled ones
  6. On-chain: execTransaction() triggered delegatecall to attacker contract, modifying storage slot 0 to grant full proxy control
  7. ~401,347 ETH drained in a single transaction

Key IOCs:

  • Bybit Cold Wallet (Proxy): 0x1Db92e2EeBC8E0c075a02BeA49a2935BcD2dFCF4
  • Attacker Contract: 0x96221423681A6d52E184D440a8eFCEbB105C7242
  • Attacker Destination: 0xbDd077f651EBe7f7b3cE16fe5F2b025BE2969516
  • Tampered JS file: _app-52c9031bfa03da47.js

2. Medusa Ransomware Deployment (Late 2025–2026)

Lazarus subgroup Stonefly/Andariel has adopted Medusa ransomware-as-a-service, shifting from pure espionage to extortion. Confirmed targets include a Middle East organization and U.S. healthcare/nonprofit entities.

Malware & Tools Deployed:

  • Medusa ransomware (SHA256: 15208030eda48b3786f7d85d756d2bd6596ef0f465d9c8509a8f02c53fad9a10)
  • Comebacker backdoor (multiple variants)
  • BLINDINGCAN information stealer
  • ChromeStealer
  • Mimikatz
  • RP_Proxy tunneling tool
  • DLL sideloading payloads

File Hash IOCs (Comebacker):

  • 0842dd5c1f79f313ea08c49d1fb227654c32485b3f413e354dbe47b8a519a120
  • 202b03d788df6a9d22bbd2cbc01ba9c7b4a9caad0f78a4d420f8c2c30171a08d
  • 61f3b09bcbae2fc2c98ccac7b2a0becdf5ddb28fe6a8b9c679fd574d58f8ca40
  • 8f6866532abd8400d244d0441be097f8209065ac43d9f864b2a6894f9da2880a
  • a12c84dabaffa868507807c645f7f0769ac848cc575a8c3b42dfb791aa5caeef
  • bf27c5e2591febe90e52cd99231526a342bc423000fe87cce44ef1c3acaeeab5

File Hash IOCs (Loaders):

  • 60b942bbdac625300eeb11cccba5ed44f376634f73d3bc01a17e7a758c570a8e — Comebacker Loader
  • 7a22880780c74b212e36ebb871af4af26a620326c456cf96a3dfb1481ee436cc — Loader
  • ab3e3a8673ba5da40b325b160a782cf2f03547d9b489e87d9546da35a65d62d6 — SSH Loader
  • 16d57ff889aab5b8c8a646da99d5a9335177fb4c158191baa1cf199f0e818d3a — DLL sideloading

File Hash IOCs (Credential Theft):

  • db98d087d4cdb2a82096df424f86edea8d4730543a2005f43bede9ffc6123791 — Mimikatz
  • e24e4c949894b08a66b925b6c55f12d1b3c69adc95b79e99a31315e289d193fc — ChromeStealer
  • 61c49c8f116cb7118dee613536085cfaa7a59d5f49c36b9ff432be7b8a7f25f0 — Credential Stealer

File Hash IOCs (RP_Proxy):

  • 3e3e0519a154266da1558e324c9097e7c39ccf88f323f2f932f204871d1b91cb
  • 60aaf6c01ba0c15b78902fd4be12c7e5f2323ade8f9db7e9fbbb9ec0c2afc8ba
  • 7530323c3976687a329e06bb7b7f95017f2cfd408f6a5261cb2f0c6b6f18f081
  • ce4fcb97ada09a42c03c3456c5fe09d805948a95efaf365eb1cd2b4e82013990

Network IOCs:

  • 23.27.140[.]49
  • 23.27.140[.]135
  • 23.27.140[.]228
  • 23.27.124[.]228

Domain IOCs:

  • amazonfiso[.]com
  • human-check[.]com
  • illycoffee[.]my
  • illycafe[.]my
  • markethubuk[.]com
  • sictradingc[.]com
  • trustpdfs[.]com
  • zypras[.]com

3. Operation Dream Job / Contagious Interview (2024–2026)

Long-running social engineering campaign targeting developers, cryptocurrency professionals, and defense sector employees with fake job offers. Recent variants include Operation 99 and the "graphalgo" campaign.

Attack Chain:

  1. Fake recruiter profiles on LinkedIn, Telegram, Facebook approach targets
  2. Targets are given coding assessments linking to malicious GitHub/GitLab repositories
  3. Malicious npm/PyPI packages execute backdoors (InvisibleFerret, OtterCookie, PyLangGhost)
  4. RATs establish persistent C2, steal credentials, crypto wallet data, and proprietary code

Notable Malware:

  • InvisibleFerret — Modular RAT with keylogging, screen capture, persistent C2
  • OtterCookie — Information stealer targeting authentication tokens, session data, crypto wallets
  • PyLangGhost — RAT for long-term espionage and data theft
  • ScoringMathTea — Complex RAT with ~40 commands, rolling substitution cipher
  • PondRAT — Stripped-down POOLRAT variant; file read/write, process execution, shellcode
  • ThemeForestRAT — 20+ commands; file/drive enumeration, process manipulation, RDP/USB monitoring
  • RemotePE — C++ RAT using Windows DPAPI for environmental keying; reserved for high-value targets

Supply Chain Scale:

  • 234+ malicious packages in npm/PyPI in first half of 2025 alone
  • bigmathutils npm package: 10,000+ downloads before malicious v1.1.0 released Feb 2026
  • 36,000 organizations affected across Europe, India, Brazil

Domain IOCs (Operation Dream Job):

  • codepool[.]cloud
  • aurevian[.]cloud
  • keondigital[.]com
  • pypilibrary[.]com
  • arcashop[.]org

4. Fake IT Worker Scheme

Over 100 U.S. companies compromised using stolen and AI-enhanced identities. An Atlanta blockchain firm lost $900,000 in virtual currency. Proceeds fund espionage targeting defense, tech, and government sectors.


MITRE ATT&CK Mapping

Reconnaissance

IDTechniqueLazarus Usage
T1593.001Search Open Websites: Social MediaLinkedIn/Twitter reconnaissance of target employees
T1589.002Gather Victim Identity: Email AddressesCollects email addresses for spearphishing
T1591.004Identify RolesTargets specific individuals with job offers

Resource Development

IDTechniqueLazarus Usage
T1583.001Acquire Infrastructure: DomainsRegisters domains for C2 and distribution
T1583.004Acquire Infrastructure: ServerAcquires servers for malicious tool hosting
T1583.006Acquire Infrastructure: Web ServicesHosts malware on GitHub, Dropbox, OneDrive
T1585.001Establish Accounts: Social MediaCreates fake LinkedIn/Twitter recruiter profiles
T1585.002Establish Accounts: EmailCreates fake email accounts for phishing
T1587.001Develop Capabilities: MalwareDevelops custom malware (DRATzarus, Torisma, etc.)
T1587.002Develop Capabilities: Code SigningDigitally signs malware
T1588.002Obtain Capabilities: ToolObtains Mimikatz, Responder, PuTTy PSCP

Initial Access

IDTechniqueLazarus Usage
T1566.001Spearphishing AttachmentMalicious Word documents with macros
T1566.002Spearphishing LinkMalicious OneDrive/Google Drive links
T1566.003Spearphishing via ServiceLinkedIn/Twitter fake recruiter messages
T1189Drive-by CompromiseWatering hole attacks delivering RATANKBA
T1199Trusted RelationshipSupply chain compromise (Safe{Wallet}, npm packages)

Execution

IDTechniqueLazarus Usage
T1059.001PowerShellExecutes commands and malicious payloads
T1059.003Windows Command ShellUses cmd.exe for host commands
T1059.005Visual BasicMacros embedded in Word documents
T1204.001User Execution: Malicious LinkLures users to execute malicious links
T1204.002User Execution: Malicious FileTricks users into launching documents
T1047Windows Management InstrumentationWMIC for discovery and execution
T1203Exploitation for Client ExecutionExploits Adobe Flash (CVE-2018-4878)

Persistence

IDTechniqueLazarus Usage
T1547.001Registry Run Keys / Startup FolderRegistry Run keys and startup folder entries
T1547.009Shortcut ModificationCreates LNK shortcuts for persistence
T1543.003Windows ServiceInstalls malware as system services
T1053.005Scheduled TaskUses schtasks for persistence
T1505.004IIS ComponentsTargets IIS servers for C2 installation

Defense Evasion

IDTechniqueLazarus Usage
T1027.002Software PackingThemida, VMProtect packers
T1027.007Dynamic API ResolutionCustom hashing to resolve APIs at runtime
T1027.009Embedded PayloadsPayloads embedded in PNG files
T1027.013Encrypted/Encoded FileAES, RC4, XOR, Base64 encryption
T1036.005Match Legitimate NameRenames malware as Microsoft narrator
T1070.004File Deletion"Suicide scripts" for secure file deletion
T1070.006TimestompCopies legitimate file timestamps
T1140Deobfuscate/Decode FilesDecrypts and manually maps DLLs into memory
T1553.002Code SigningSigns malware with Sectigo RSA certificates
T1574.001DLL Search Order HijackingDLL side-loading via replaced win_fw.dll
T1622Debugger EvasionIsDebuggerPresent checks
T1497.001System ChecksDetects sandboxes and VMware services
T1218.011Rundll32Executes payloads via rundll32
T1218.010Regsvr32Executes malware via regsvr32
T1220XSL Script ProcessingRemote XSL scripts to download DLLs

Credential Access

IDTechniqueLazarus Usage
T1003OS Credential DumpingMimikatz, procdump against LSASS
T1110.003Password SprayingWeak passwords against Windows shares
T1555Credentials from Password StoresChromeStealer for browser credentials
T1056.001KeyloggingKiloAlfa malware with keylogging

Discovery

IDTechniqueLazarus Usage
T1082System Information DiscoveryCollects OS type, computer name, CPU info
T1016System Network Configuration DiscoveryNetwork interface enumeration
T1057Process DiscoveryGathers running processes for C2
T1083File and Directory DiscoveryEnumerates files by extension
T1087.002Domain Account DiscoveryQueries AD for employee lists
T1012Query RegistryChecks for Bitcoin wallets, remote access tools
T1046Network Service Discoverynmap port scanning

Lateral Movement

IDTechniqueLazarus Usage
T1021.001Remote Desktop ProtocolSierraCharlie malware uses RDP
T1021.002SMB/Windows Admin SharesSierraAlfa accesses ADMIN$ shares
T1021.004SSHSSH and PuTTy PSCP for access

Collection & Exfiltration

IDTechniqueLazarus Usage
T1560Archive Collected DataRAR compression with custom encryption
T1074.001Local Data StagingStages data in %TEMP% before exfiltration
T1041Exfiltration Over C2 ChannelExfiltrates through C2 connections
T1567.002Exfiltration Over Web ServiceCustom dbxcli for Dropbox exfiltration

Command & Control

IDTechniqueLazarus Usage
T1071.001Web ProtocolsC2 over HTTP/HTTPS
T1573.001Symmetric CryptographyXOR, AES, Caracachs encrypted channels
T1001.003Protocol ImpersonationFakeTLS encryption mimicking TLS
T1008Fallback ChannelsMultiple hard-coded C2 servers
T1571Non-Standard PortPort-protocol mismatches for C2
T1102.002Bidirectional CommunicationGitHub as C2 (commits execution output)
T1090ProxyInternal and external proxies to obfuscate traffic

Impact

IDTechniqueLazarus Usage
T1485Data DestructionOverwrites file contents with heap memory data
T1561.001Disk Content WipeOverwrites first 64MB+ of drives
T1561.002Disk Structure WipeOverwrites Master Boot Record
T1489Service StopStops MSExchangeIS service
T1529System Shutdown/RebootReboots after destroying files

Indicators of Compromise (IOC) Summary

File Hashes (SHA256)

HashDescription
15208030eda48b3786f7d85d756d2bd6596ef0f465d9c8509a8f02c53fad9a10Medusa ransomware
0842dd5c1f79f313ea08c49d1fb227654c32485b3f413e354dbe47b8a519a120Comebacker backdoor
202b03d788df6a9d22bbd2cbc01ba9c7b4a9caad0f78a4d420f8c2c30171a08dComebacker backdoor
61f3b09bcbae2fc2c98ccac7b2a0becdf5ddb28fe6a8b9c679fd574d58f8ca40Comebacker backdoor
8f6866532abd8400d244d0441be097f8209065ac43d9f864b2a6894f9da2880aComebacker backdoor
a12c84dabaffa868507807c645f7f0769ac848cc575a8c3b42dfb791aa5caeefComebacker backdoor
bf27c5e2591febe90e52cd99231526a342bc423000fe87cce44ef1c3acaeeab5Comebacker backdoor
60b942bbdac625300eeb11cccba5ed44f376634f73d3bc01a17e7a758c570a8eComebacker Loader
7a22880780c74b212e36ebb871af4af26a620326c456cf96a3dfb1481ee436ccLoader
ab3e3a8673ba5da40b325b160a782cf2f03547d9b489e87d9546da35a65d62d6SSH Loader
16d57ff889aab5b8c8a646da99d5a9335177fb4c158191baa1cf199f0e818d3aDLL sideloading
db98d087d4cdb2a82096df424f86edea8d4730543a2005f43bede9ffc6123791Mimikatz variant
e24e4c949894b08a66b925b6c55f12d1b3c69adc95b79e99a31315e289d193fcChromeStealer
61c49c8f116cb7118dee613536085cfaa7a59d5f49c36b9ff432be7b8a7f25f0Credential Stealer
3e3e0519a154266da1558e324c9097e7c39ccf88f323f2f932f204871d1b91cbRP_Proxy
60aaf6c01ba0c15b78902fd4be12c7e5f2323ade8f9db7e9fbbb9ec0c2afc8baRP_Proxy
7530323c3976687a329e06bb7b7f95017f2cfd408f6a5261cb2f0c6b6f18f081RP_Proxy
ce4fcb97ada09a42c03c3456c5fe09d805948a95efaf365eb1cd2b4e82013990RP_Proxy

Network Indicators

TypeIndicatorContext
IP23.27.140[.]49C2 infrastructure (Medusa campaign)
IP23.27.140[.]135C2 infrastructure (Medusa campaign)
IP23.27.140[.]228C2 infrastructure (Medusa campaign)
IP23.27.124[.]228C2 infrastructure (Medusa campaign)
Domainamazonfiso[.]comC2 / phishing infrastructure
Domainhuman-check[.]comC2 / phishing infrastructure
Domainillycoffee[.]myC2 / phishing infrastructure
Domainillycafe[.]myC2 / phishing infrastructure
Domainmarkethubuk[.]comC2 / phishing infrastructure
Domainsictradingc[.]comC2 / phishing infrastructure
Domaintrustpdfs[.]comC2 / phishing infrastructure
Domainzypras[.]comC2 / phishing infrastructure
Domaincodepool[.]cloudScoringMathTea RAT C2
Domainaurevian[.]cloudScoringMathTea RAT C2
Domainkeondigital[.]comAppleJeus / supply chain C2
Domainpypilibrary[.]comSupply chain attack infrastructure
Domainarcashop[.]orgSupply chain attack infrastructure

Blockchain Indicators (Bybit Heist)

TypeAddressContext
ETH Contract0x96221423681A6d52E184D440a8eFCEbB105C7242Attacker malicious contract
ETH Address0xbDd077f651EBe7f7b3cE16fe5F2b025BE2969516Attacker destination wallet

Detection Rules

The following detection rules target key Lazarus Group TTPs across their major campaigns. Rules cover credential dumping (T1003), DLL sideloading (T1574.001), supply chain package execution (T1195), suspicious scheduled tasks (T1053.005), PowerShell-based payload delivery (T1059.001), and network indicators from active C2 infrastructure. Log sources covered include Windows Security/Sysmon, process creation, DNS, network connections, and file events.

Sigma Rules

Sigma Rule 1: Lazarus-Style LSASS Credential Dumping via Procdump

yaml
title: Lazarus-Style LSASS Credential Dumping via Procdump
id: 8a7c5f3e-1b2d-4c6a-9e0f-3d4b5a6c7d8e
status: experimental
description: Detects use of procdump to dump LSASS memory, a technique heavily used by Lazarus Group for credential access (T1003.001).
references:
    - https://attack.mitre.org/groups/G0032/
    - https://attack.mitre.org/techniques/T1003/001/
author: AEGIS Research Agent
date: 2026-04-02
tags:
    - attack.credential_access
    - attack.t1003.001
    - threat.group.lazarus
logsource:
    category: process_creation
    product: windows
detection:
    selection:
        Image|endswith: '\procdump.exe'
        CommandLine|contains|all:
            - 'lsass'
            - '-ma'
    condition: selection
falsepositives:
    - Legitimate system administrators using procdump for troubleshooting
level: high

Sigma Rule 2: Suspicious DLL Sideloading via Rundll32 — Lazarus TTP

yaml
title: Suspicious DLL Sideloading via Rundll32 — Lazarus TTP
id: 9b8c6f4d-2c3e-5d7b-0f1a-4e5c6b7d8e9f
status: experimental
description: Detects rundll32.exe executing DLLs from suspicious temporary or user-writable directories, consistent with Lazarus Group DLL sideloading techniques (T1574.001, T1218.011).
references:
    - https://attack.mitre.org/groups/G0032/
    - https://attack.mitre.org/techniques/T1574/001/
author: AEGIS Research Agent
date: 2026-04-02
tags:
    - attack.defense_evasion
    - attack.t1218.011
    - attack.persistence
    - attack.t1574.001
    - threat.group.lazarus
logsource:
    category: process_creation
    product: windows
detection:
    selection:
        Image|endswith: '\rundll32.exe'
    filter_paths:
        CommandLine|contains:
            - '\AppData\Local\Temp\'
            - '\Users\Public\'
            - '\ProgramData\'
            - '\Windows\Temp\'
    filter_system:
        CommandLine|contains:
            - '\Windows\System32\'
            - '\Windows\SysWOW64\'
            - '\Program Files'
    condition: selection and filter_paths and not filter_system
falsepositives:
    - Legitimate software installers using rundll32 from temp directories
level: medium

Sigma Rule 3: Lazarus Scheduled Task Persistence Pattern

yaml
title: Lazarus Scheduled Task Persistence Pattern
id: 0c9d7a5e-3d4f-6e8c-1a2b-5f6d7e8a9b0c
status: experimental
description: Detects creation of scheduled tasks with characteristics matching Lazarus Group persistence patterns — tasks executing DLLs via rundll32 or scripts from temp directories (T1053.005).
references:
    - https://attack.mitre.org/groups/G0032/
    - https://attack.mitre.org/techniques/T1053/005/
author: AEGIS Research Agent
date: 2026-04-02
tags:
    - attack.persistence
    - attack.t1053.005
    - threat.group.lazarus
logsource:
    category: process_creation
    product: windows
detection:
    selection_schtasks:
        Image|endswith: '\schtasks.exe'
        CommandLine|contains: '/create'
    selection_payload:
        CommandLine|contains:
            - 'rundll32'
            - 'regsvr32'
            - 'mshta'
            - 'wscript'
            - 'cscript'
    selection_location:
        CommandLine|contains:
            - '\Temp\'
            - '\AppData\'
            - '\ProgramData\'
            - '\Users\Public\'
    condition: selection_schtasks and selection_payload and selection_location
falsepositives:
    - Software installers creating scheduled tasks for updates
level: high

Sigma Rule 4: DNS Query to Known Lazarus C2 Domains

yaml
title: DNS Query to Known Lazarus C2 Domains
id: 1d0e8b6f-4e5a-7f9d-2b3c-6a7e8f9b0c1d
status: experimental
description: Detects DNS queries to domains associated with active Lazarus Group C2 infrastructure from Medusa ransomware and Operation Dream Job campaigns.
references:
    - https://attack.mitre.org/groups/G0032/
    - https://www.security.com/threat-intelligence/lazarus-medusa-ransomware
author: AEGIS Research Agent
date: 2026-04-02
tags:
    - attack.command_and_control
    - attack.t1071.001
    - threat.group.lazarus
logsource:
    category: dns_query
    product: windows
detection:
    selection:
        QueryName|endswith:
            - 'amazonfiso.com'
            - 'human-check.com'
            - 'illycoffee.my'
            - 'illycafe.my'
            - 'markethubuk.com'
            - 'sictradingc.com'
            - 'trustpdfs.com'
            - 'zypras.com'
            - 'codepool.cloud'
            - 'aurevian.cloud'
            - 'keondigital.com'
            - 'pypilibrary.com'
            - 'arcashop.org'
    condition: selection
falsepositives:
    - Unlikely — these are known malicious domains
level: critical

Sigma Rule 5: Suspicious npm/PyPI Package Installation with Network Callback

yaml
title: Suspicious npm/PyPI Package Installation with Network Callback
id: 2e1f9c7a-5f6b-8a0e-3c4d-7b8f9a0c1d2e
status: experimental
description: Detects node.js or Python processes spawning network connections shortly after package installation, consistent with Lazarus supply chain attacks via malicious npm/PyPI packages.
references:
    - https://attack.mitre.org/groups/G0032/
    - https://thehackernews.com/2026/02/lazarus-campaign-plants-malicious.html
author: AEGIS Research Agent
date: 2026-04-02
tags:
    - attack.execution
    - attack.t1059.007
    - attack.initial_access
    - attack.t1195.002
    - threat.group.lazarus
logsource:
    category: process_creation
    product: windows
detection:
    selection_parent:
        ParentImage|endswith:
            - '\npm.cmd'
            - '\node.exe'
            - '\pip.exe'
            - '\pip3.exe'
            - '\python.exe'
            - '\python3.exe'
    selection_child:
        Image|endswith:
            - '\cmd.exe'
            - '\powershell.exe'
            - '\curl.exe'
            - '\wget.exe'
            - '\certutil.exe'
    condition: selection_parent and selection_child
falsepositives:
    - Legitimate post-install scripts in npm/pip packages
    - Development build tools
level: medium

YARA Rules

YARA Rule 1: Lazarus Comebacker Backdoor

yara
rule Lazarus_Comebacker_Backdoor
{
    meta:
        description = "Detects Lazarus Group Comebacker backdoor variants used in Medusa ransomware and espionage campaigns"
        author = "AEGIS Research Agent"
        date = "2026-04-02"
        reference = "https://www.security.com/threat-intelligence/lazarus-medusa-ransomware"
        hash1 = "0842dd5c1f79f313ea08c49d1fb227654c32485b3f413e354dbe47b8a519a120"
        hash2 = "202b03d788df6a9d22bbd2cbc01ba9c7b4a9caad0f78a4d420f8c2c30171a08d"
        severity = "high"
        tlp = "amber"

    strings:
        $mz = "MZ"

        // Common Comebacker C2 communication patterns
        $s1 = "POST /api/" ascii wide
        $s2 = "Content-Type: application/x-www-form-urlencoded" ascii wide
        $s3 = "Mozilla/5.0" ascii wide

        // Registry persistence patterns
        $r1 = "SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run" ascii wide
        $r2 = "Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Shell Folders" ascii wide

        // Crypto and encoding routines
        $c1 = { 8B ?? 33 ?? 89 ?? 83 ?? 04 } // XOR loop pattern
        $c2 = "AES" ascii wide
        $c3 = "CryptDecrypt" ascii
        $c4 = "CryptEncrypt" ascii

        // Anti-analysis
        $a1 = "IsDebuggerPresent" ascii
        $a2 = "GetTickCount" ascii
        $a3 = "vmware" ascii nocase
        $a4 = "VBoxService" ascii nocase

    condition:
        $mz at 0 and
        (3 of ($s*)) and
        (1 of ($c*)) and
        (1 of ($a*)) and
        (1 of ($r*))
}

YARA Rule 2: Lazarus Supply Chain Malicious npm/PyPI Package

yara
rule Lazarus_Supply_Chain_Malicious_Package
{
    meta:
        description = "Detects malicious JavaScript/Python packages associated with Lazarus Group supply chain attacks (graphalgo, bigmathutils campaigns)"
        author = "AEGIS Research Agent"
        date = "2026-04-02"
        reference = "https://thehackernews.com/2026/02/lazarus-campaign-plants-malicious.html"
        severity = "high"
        tlp = "amber"

    strings:
        // Malicious package indicators
        $pkg1 = "graphalgo" ascii
        $pkg2 = "bigmathutils" ascii
        $pkg3 = "graphnetworkx" ascii

        // Common Lazarus JS payload patterns
        $js1 = "child_process" ascii
        $js2 = "eval(Buffer.from(" ascii
        $js3 = ".spawn(" ascii
        $js4 = "require('os')" ascii

        // Python payload patterns
        $py1 = "subprocess.Popen" ascii
        $py2 = "base64.b64decode" ascii
        $py3 = "exec(compile(" ascii

        // C2 callback patterns
        $c2_1 = "XMLHttpRequest" ascii
        $c2_2 = "fetch(" ascii
        $c2_3 = "urllib.request" ascii

        // Credential/wallet theft
        $steal1 = "discord" ascii nocase
        $steal2 = "wallet" ascii nocase
        $steal3 = "chrome" ascii nocase
        $steal4 = "keychain" ascii nocase

    condition:
        (1 of ($pkg*)) or
        (
            filesize < 500KB and
            (2 of ($js*) or 2 of ($py*)) and
            (1 of ($c2_*)) and
            (1 of ($steal*))
        )
}

Snort Rules

Snort Rule 1: Lazarus C2 Domain DNS Lookup

alert dns $HOME_NET any -> any 53 (msg:"AEGIS - Lazarus Group Known C2 Domain DNS Query"; content:"amazonfiso"; nocase; sid:2026040201; rev:1; classtype:trojan-activity; metadata:author AEGIS, date 2026-04-02, threat_group Lazarus, mitre_attack T1071.001;)
alert dns $HOME_NET any -> any 53 (msg:"AEGIS - Lazarus Group Known C2 Domain DNS Query"; content:"human-check"; nocase; sid:2026040202; rev:1; classtype:trojan-activity; metadata:author AEGIS, date 2026-04-02, threat_group Lazarus, mitre_attack T1071.001;)
alert dns $HOME_NET any -> any 53 (msg:"AEGIS - Lazarus Group Known C2 Domain DNS Query"; content:"zypras"; nocase; sid:2026040203; rev:1; classtype:trojan-activity; metadata:author AEGIS, date 2026-04-02, threat_group Lazarus, mitre_attack T1071.001;)
alert dns $HOME_NET any -> any 53 (msg:"AEGIS - Lazarus Group Known C2 Domain DNS Query"; content:"trustpdfs"; nocase; sid:2026040204; rev:1; classtype:trojan-activity; metadata:author AEGIS, date 2026-04-02, threat_group Lazarus, mitre_attack T1071.001;)
alert dns $HOME_NET any -> any 53 (msg:"AEGIS - Lazarus Group Known C2 Domain DNS Query"; content:"sictradingc"; nocase; sid:2026040205; rev:1; classtype:trojan-activity; metadata:author AEGIS, date 2026-04-02, threat_group Lazarus, mitre_attack T1071.001;)
alert dns $HOME_NET any -> any 53 (msg:"AEGIS - Lazarus Group Known C2 Domain DNS Query"; content:"codepool"; nocase; sid:2026040206; rev:1; classtype:trojan-activity; metadata:author AEGIS, date 2026-04-02, threat_group Lazarus, mitre_attack T1071.001;)

Snort Rule 2: Lazarus C2 IP Communication

alert ip $HOME_NET any -> 23.27.140.49 any (msg:"AEGIS - Lazarus Group Known C2 IP Communication"; sid:2026040207; rev:1; classtype:trojan-activity; metadata:author AEGIS, date 2026-04-02, threat_group Lazarus, mitre_attack T1071;)
alert ip $HOME_NET any -> 23.27.140.135 any (msg:"AEGIS - Lazarus Group Known C2 IP Communication"; sid:2026040208; rev:1; classtype:trojan-activity; metadata:author AEGIS, date 2026-04-02, threat_group Lazarus, mitre_attack T1071;)
alert ip $HOME_NET any -> 23.27.140.228 any (msg:"AEGIS - Lazarus Group Known C2 IP Communication"; sid:2026040209; rev:1; classtype:trojan-activity; metadata:author AEGIS, date 2026-04-02, threat_group Lazarus, mitre_attack T1071;)
alert ip $HOME_NET any -> 23.27.124.228 any (msg:"AEGIS - Lazarus Group Known C2 IP Communication"; sid:2026040210; rev:1; classtype:trojan-activity; metadata:author AEGIS, date 2026-04-02, threat_group Lazarus, mitre_attack T1071;)

Sources

MIT License