Kim Il Sung University Website and Software

I’ve been trying to find a GitHub commit that had a commit from North Korea. For some reason I never saved it. But I found something much more interesting here: https://github.com/Alyzana/kwang-myong-addresses/blob/master/sites-en

I have no idea where the data is from but the user has a list of domains on Naenara. Most of them don’t resolve but the one interesting thing I did find when doing some quick research is that apparently rns.edu.kp did resolve last year. To make things much more interesting the only URL that I could reliably find is rns.edu.kp/AntiVirus

This lead down a further search and I found a references to the BangPae-Client from KIM IL SUNG University MATH. I have no idea what this is but I found these hashes:

3e459baf7f73e38c3779b07db58c2821

9b4a54b93351a35b34299a4d9db16afd

eb18354bc621e53fabf5375ef9b42664

decb5dd7c6a3a74d9b89df2d643af0e4

85ba460b6c11da2c01cef6a296073630

If anyone has a copy and wants to share, I would appreciate it. I haven’t been able to find a copy at all. Additional details are below:

Directories found on disk:

  • C:\Program Files\BangPae-Client
  • C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\BangPae-Client

Generally, the following files are left on disk:

  • C:\Program Files\BangPae-Client\audio\2_13.pcm
  • C:\Program Files\BangPae-Client\audio\2_14.pcm
  • C:\Program Files\BangPae-Client\audio\2_17.pcm
  • C:\Program Files\BangPae-Client\audio\2_19.pcm
  • C:\Program Files\BangPae-Client\audio\2_24.pcm
  • C:\Program Files\BangPae-Client\audio\2_4.pcm
  • C:\Program Files\BangPae-Client\audio\2_9.pcm
  • C:\Program Files\BangPae-Client\BangPae-Client.exe
  • C:\Program Files\BangPae-Client\GPUCache\data_0
  • C:\Program Files\BangPae-Client\GPUCache\data_1
  • C:\Program Files\BangPae-Client\GPUCache\data_2
  • C:\Program Files\BangPae-Client\GPUCache\data_3
  • C:\Program Files\BangPae-Client\GPUCache\index
  • C:\Program Files\BangPae-Client\help.pdf
  • C:\Program Files\BangPae-Client\iconengines\qsvgicon.dll
  • C:\Program Files\BangPae-Client\imageformats\qgif.dll
  • C:\Program Files\BangPae-Client\imageformats\qico.dll
  • C:\Program Files\BangPae-Client\imageformats\qjpeg.dll
  • C:\Program Files\BangPae-Client\imageformats\qsvg.dll
  • C:\Program Files\BangPae-Client\kpcholim.ttc
  • C:\Program Files\BangPae-Client\kpchopom.ttc
  • C:\Program Files\BangPae-Client\libcrypto-1_1-x64.dll
  • C:\Program Files\BangPae-Client\libgcc_s_seh-1.dll
  • C:\Program Files\BangPae-Client\libssl-1_1-x64.dll
  • C:\Program Files\BangPae-Client\libstdc++-6.dll
  • C:\Program Files\BangPae-Client\libwinpthread-1.dll
  • C:\Program Files\BangPae-Client\lua5.1.dll
  • C:\Program Files\BangPae-Client\OpenAL32.dll
  • C:\Program Files\BangPae-Client\platforms\qdirect2d.dll
  • C:\Program Files\BangPae-Client\platforms\qminimal.dll
  • C:\Program Files\BangPae-Client\platforms\qoffscreen.dll
  • C:\Program Files\BangPae-Client\platforms\qwindows.dll
  • C:\Program Files\BangPae-Client\Poster\poster_big-1.dat
  • C:\Program Files\BangPae-Client\Poster\poster_big-2.dat
  • C:\Program Files\BangPae-Client\Poster\poster_big-3.dat
  • C:\Program Files\BangPae-Client\Poster\poster_big-4.dat
  • C:\Program Files\BangPae-Client\Poster\poster_big-5.dat
  • C:\Program Files\BangPae-Client\Poster\poster_big-6.dat
  • C:\Program Files\BangPae-Client\Poster\poster_small-1.dat
  • C:\Program Files\BangPae-Client\Poster\poster_small-2.dat
  • C:\Program Files\BangPae-Client\Poster\poster_small-3.dat
  • C:\Program Files\BangPae-Client\Poster\poster_small-4.dat
  • C:\Program Files\BangPae-Client\Poster\poster_small-5.dat
  • C:\Program Files\BangPae-Client\Poster\poster_small-6.dat
  • C:\Program Files\BangPae-Client\Qt5Core.dll
  • C:\Program Files\BangPae-Client\Qt5Gui.dll
  • C:\Program Files\BangPae-Client\Qt5Network.dll
  • C:\Program Files\BangPae-Client\Qt5Svg.dll
  • C:\Program Files\BangPae-Client\Qt5Widgets.dll
  • C:\Program Files\BangPae-Client\Qt5Xml.dll
  • C:\Program Files\BangPae-Client\RecordSample.sam
  • C:\Program Files\BangPae-Client\uninstall.exe
  • C:\Program Files\BangPae-Client\Uninstall\IRIMG1.JPG
  • C:\Program Files\BangPae-Client\Uninstall\IRIMG2.JPG
  • C:\Program Files\BangPae-Client\Uninstall\IRIMG3.JPG
  • C:\Program Files\BangPae-Client\Uninstall\uninstall.dat
  • C:\Program Files\BangPae-Client\Uninstall\uninstall.xml
  • C:\Program Files\BangPae-Client\Win10 Active Tool.exe
  • C:\Users\Administrator\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\125\{6D809377-6AF0-444B-8957-A3773F02200E}_BangPae-Client_BangPae-Client_exe
  • C:\Users\Administrator\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\125\{6D809377-6AF0-444B-8957-A3773F02200E}_BangPae-Client_help_pdf
  • C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Recent\BangPae-Client.suf.lnk
  • C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Recent\BangPae-Client-1.9.0-20201203.exe.7z.lnk
  • C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Recent\BangPae-Client-1.9.0-20201217.exe.7z.lnk
  • C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Recent\BangPae-Client-1.9.1-20201217.exe.7z.lnk
  • C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\BangPae-Client\BangPae-Client.lnk
  • C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\BangPae-Client\BangPae-Help.lnk
  • C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\BangPae-Client\Uninstall BangPae-Client.lnk

Use regedit.exe to manually remove from the Windows Registry the keys below:

  • HKEY_LOCAL_MACHINE\Software\Microsoft\RADAR\HeapLeakDetection\DiagnosedApplications\BangPae-Client.exe
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\BangPae-Client1.9.1

Registry values that are not removed from your PC:

  • HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache\C:\program files\bangpae-client\bangpae-client.exe.FriendlyAppName
  • HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache\C:\program files\bangpae-client\bangpae-client-test-202012282110.exe.FriendlyAppName
  • HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache\C:\Program Files\BangPae-Client\KCTV.exe.FriendlyAppName
  • HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache\D:\dev\meeting system\qTox\Distribution\1.9\Client\BangPae-Client-1.9.1.exe.FriendlyAppName
  • HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache\D:\dev\meeting system\qTox\Distribution\1.9\Client\BangPae-Client-1.9.2.exe.FriendlyAppName
  • HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache\D:\dev\meeting system\qTox\work\Setup\Client\BangPae-Client-x86_64-release\BangPae-Client.exe.FriendlyAppName
  • HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache\D:\dev\meeting system\qTox\work\Setup\Client\BangPae-Client-x86_64-release\BangPae-Client-202013311336.exe.FriendlyAppName
  • HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache\J:\Dev\JYJ\New Folder\TEST\BangPae-Client-1.7.7-del.exe.ApplicationCompany
  • HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache\J:\Dev\JYJ\New Folder\TEST\BangPae-Client-1.7.7-del.exe.FriendlyAppName
  • HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache\M:\BangPae-Client.exe.FriendlyAppName
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\bam\State\UserSettings\S-1-5-21-1243145971-3851564632-427313449-500\\Device\HarddiskVolume3\Program Files\BangPae-Client\BangPae-Client.exe
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\bam\State\UserSettings\S-1-5-21-1243145971-3851564632-427313449-500\\Device\HarddiskVolume3\Program Files\BangPae-Client\uninstall.exe
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\TCP Query User{553D376B-C335-4AEE-AD0A-06DA388B93B0}C:\program files\bangpae-client\bangpae-client.exe
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\TCP Query User{7B36511F-CCE6-433B-99D4-2A8B9AEF8892}C:\program files\bangpae-client\bangpae-client-test-202012282110.exe
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\UDP Query User{1A4B66A6-21CB-441E-83E7-80F6B9F75306}C:\program files\bangpae-client\bangpae-client-test-202012282110.exe
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\UDP Query User{5D3E7543-AF1A-4B21-8EBB-457C0434908C}C:\program files\bangpae-client\bangpae-client.exe

Domains From the Uriminzokkiri Breach

For the longest time I’ve been meaning to go through this data dump and see if there was anything interesting in there. For now here’s a list of KP domains that don’t come up too often. https://www.databreaches.net/uriminzokkiri-breach-update-9001-accounts-leaked-and-message-released-for-opnorthkorea/

kcc.go.kp
nnr.kcc.co.kp
co.kp
chongbong.kcc.go.kp
uri.kp.kp
mgic.kcc.go.kp
kgic.com.kp
kut.ac.kp
naenara.ko.kp
dg.kp
naenara.co.kp
sobaeksu.kcc.kp
sillibanck.kp.com
naenara.inf.kp
123.kp
kcc.oic.co.kp
htd.co.kp
cn.kp

korstamp.com.kp Authors

Interesting to see that korstamp.com.kp has a set of authors listed on each page. Can’t seem to find much information about anyone.

There’s also a list of contact emails that are outside the traditional DRPK email domains:

email : stamp@star-co.net.kp, stampdealerlink@163.com, kssb_exhi@foxmail.com, xuyong0824@qq.com, jugwangjang@gmail.com

Broken Search dprkportal.kp

Searching on dprkportal.kp appears to be broken. Example below:

Digging into the javascript it looks like most of the validation is done in the browser based on a regex

I haven’t tested further but the search can be accessed with the following example:

curl http://dprkportal.kp/include/search_func.php?action=search_site&keyword=kcna.kp&page=1

I assume the search doesn’t ever return results since the string for each URL has a period in it and the search bar automatically removes these when typed or copied in.

Found NetKey.exe

I finally found a copy of netkey.exe that I posted about a few months back. Haven’t had a chance to really try it out yet and the IP is my own. I’m also relying on Google Translate but it looks like it’s titled Network Certification Program, but if anyone can help translate that would be greatly appreciated.

A New Non-Routable TLD?

I can’t find anything online about this yet but looking at the subject information for the cert at vok.rep.kp there’s a pretty interesting email address listed. I haven’t seen any email or domain so far that’s publicly accessible for tech.krt.kp

Re-visiting KCNA’s malware/exploit page

I was reminded of this article yesterday where a few years ago there was a malicious download made available on kcna.kp: https://www.pcworld.com/article/2868436/north-korean-official-news-agency-site-serves-malware.html

Despite this being discovered a few years ago, you can still find references to the file in the source of the site

The one thing that’s interesting is that part of the URL has exploit in it, but as the article notes it could just be a translation error. One of the things that I found interesting looking at the source of the page is that there are hidden links for check_system_password and admin_login

There’s also a directory siteFiles/exploit but I saved a few of the files and sent them to VirusTotal doesn’t look like there is anything suspicious:

https://www.virustotal.com/gui/file/a21a277ccbbe9f992f004341873ed645798e5ebd5a55980d8ebce3e85e2a3c3f/detection

https://www.virustotal.com/gui/file/140181ac8dd94051940ca2bde09d7787725cf3e507a53494ced8333e3f9019c2/detection

Also based on the dates for some of the files it looks like they’ve been known for at least a few years.

Now these two links don’t load anything and they aren’t visible but archive.org captured these pages back in 2015 and it looks like it just causes the page to continuously reload:

https://web.archive.org/web/20150703061753id_/http://kcna.kp/admin_login

Looking through some of the site I also found similar references where there are links in the code but not visible anywhere on the site:

/system_admin_login_class

/check_db_password

/\\\check_system_password

Neither of those pages load but just found it interesting that they these links are hidden in the code but not visible anywhere on the site that I’ve been able to find.