ESET researchers have not too long ago noticed a brand new occasion of Operation DreamJob – a marketing campaign that we observe beneath the umbrella of North Korea-aligned Lazarus – wherein a number of European firms energetic within the protection business had been focused. A few of these are closely concerned within the unmanned aerial automobile (UAV) sector, suggesting that the operation could also be linked to North Korea’s present efforts to scale up its drone program. This blogpost discusses the broader geopolitical implications of the marketing campaign, and offers a high-level overview of the toolset utilized by the attackers.
Key factors of this blogpost:
- Lazarus assaults towards firms growing UAV expertise align with not too long ago reported developments within the North Korean drone program.
- The suspected major purpose of the attackers was seemingly the theft of proprietary data and manufacturing know-how.
- Primarily based on the social-engineering approach used for preliminary entry, trojanizing open-source tasks from GitHub, and the deployment of ScoringMathTea, we contemplate these assaults to be a brand new wave of the Operation DreamJob marketing campaign.
- The group’s most important evolution is the introduction of latest libraries designed for DLL proxying and the collection of new open-source tasks to trojanize for improved evasion.
Profile of Lazarus and its Operation DreamJob
The Lazarus group (often known as HIDDEN COBRA) is an APT group linked to North Korea that has been energetic since at the very least 2009. It’s accountable for high-profile incidents resembling each the Sony Footage Leisure hack and tens-of-millions-of-dollar cyberheists in 2016, the WannaCryptor (aka WannaCry) outbreak in 2017, and an extended historical past of disruptive assaults towards South Korean public and demanding infrastructure since at the very least 2011. The variety, quantity, and eccentricity in implementation of Lazarus campaigns outline this group, in addition to that it performs all three pillars of cybercriminal actions: cyberespionage, cybersabotage, and pursuit of economic acquire.
Operation DreamJob is a codename for Lazarus campaigns that rely totally on social engineering, particularly utilizing faux job affords for prestigious or high-profile positions (the “dream job” lure). This identify was coined in a 2020 blogpost by ClearSky, and overlaps with campaigns like DeathNote or Operation North Star. Targets are predominantly within the aerospace and protection sectors, adopted by engineering and expertise firms and the media and leisure sector. In these campaigns, the attackers often deploy trojanized open-source plugins for software program like Notepad++ and WinMerge that function droppers and loaders, and payloads like ImprudentCook, ScoringMathTea, BlindingCan, miniBlindingCan, LightlessCan for Home windows, and SimplexTea for Linux. The first purpose is cyberespionage, specializing in stealing delicate knowledge, mental property, and proprietary data, and the secondary purpose is monetary acquire.
Overview
Beginning in late March 2025, we noticed in ESET telemetry cyberattacks harking back to Operation DreamJob campaigns. The in-the-wild assaults successively focused three European firms energetic within the protection sector. Though their actions are considerably various, these entities might be described as:
- a steel engineering firm (Southeastern Europe),
- a producer of plane parts (Central Europe), and
- a protection firm (Central Europe).
All instances concerned droppers which have the attention-grabbing inside DLL identify, DroneEXEHijackingLoader.dll, which led us down the drone section rabbit gap. Additionally, preliminary entry was seemingly achieved through social engineering – an Operation DreamJob specialty. The dominant theme is a profitable however fake job supply with a aspect of malware: the goal receives a decoy doc with a job description and a trojanized PDF reader to open it.
The primary payload deployed to the targets was ScoringMathTea, a RAT that provides the attackers full management over the compromised machine. Its first look dates to late 2022, when its dropper was uploaded to VirusTotal. Quickly after, it was seen within the wild, and since then in a number of assaults attributed to Lazarus’ Operation DreamJob campaigns, which makes it the attacker’s payload of selection for already three years. It makes use of compromised servers for C&C communication, with the server half often saved beneath the WordPress folder containing design templates or plugins.
In abstract, we attribute this exercise with a excessive degree of confidence to Lazarus, significantly to its campaigns associated to Operation DreamJob, primarily based on the next:
- Preliminary entry was obtained by social engineering, convincing the goal to execute malware disguised as a job description, in an effort to achieve a hiring course of.
- Trojanizing open-source tasks after which crafting their exports to suit the DLL side-loading appears to be an strategy particular to Operation DreamJob.
- The flagship payload for later levels, ScoringMathTea, was utilized in a number of comparable assaults previously.
- The focused sectors, situated in Europe, align with the targets of the earlier situations of Operation DreamJob (aerospace, protection, engineering).
Geopolitical context
The three focused organizations manufacture several types of navy gear (or elements thereof), lots of that are presently deployed in Ukraine on account of European nations’ navy help. On the time of Operation DreamJob’s noticed exercise, North Korean troopers had been deployed in Russia, reportedly to assist Moscow repel Ukraine’s offensive within the Kursk oblast. It’s thus potential that Operation DreamJob was serious about amassing delicate data on some Western-made weapons techniques presently employed within the Russia-Ukraine battle.
Extra usually, these entities are concerned within the manufacturing of varieties of materiel that North Korea additionally manufactures domestically, and for which it may be hoping to excellent its personal designs and processes. In any case, there isn’t any indication that the focused firms provide navy gear to the South Korean armed forces – which may have been one other factor explaining Operation DreamJob’s curiosity in these firms. Apparently, nevertheless, at the very least two of those organizations are clearly concerned within the growth of UAV expertise, with one manufacturing important drone parts and the opposite reportedly engaged within the design of UAV-related software program.
The curiosity in UAV-related know-how is notable, because it echoes current media stories indicating that Pyongyang is investing closely in home drone manufacturing capabilities. Though this endeavor might be traced again to greater than a decade in the past, many observers posit that North Korea’s current expertise of contemporary warfare within the Russia-Ukraine battle has solely strengthened Pyongyang’s decision with regard to its drone program. The North Korean regime is now reportedly receiving help from Russia to provide its personal model of the Iranian-made Shahed suicide drone and can also be apparently engaged on low-cost assault UAVs that may very well be exported to African or Center Japanese nations.
Assessing the “drone connection”
If one factor is evident, it’s that North Korea has relied closely on reverse engineering and mental property theft to develop its home UAV capabilities. As current open-source stories illustrate, North Korea’s present flagship reconnaissance drone, the Saetbyol‑4, seems to be like a carbon copy of the Northrop Grumman RQ‑4 International Hawk, whereas its multipurpose fight drone, the Saetbyol‑9, bears a hanging resemblance to Normal Atomics’ MQ‑9 Reaper. The truth that each designations replicate the quantity related to their US equal would possibly even be a not-so-subtle nod to that impact. Though these aircrafts’ efficiency might effectively differ from these of their US counterparts, there’s little doubt that the latter served as a robust inspiration for North Korea’s designs.
That is in all probability the place cybercapabilities enter the fray. Whereas different intelligence sources had been seemingly mobilized by Pyongyang to assist copy Western UAVs, there are indications that cyberespionage might have performed a job. Lately, a number of campaigns affecting the aerospace sector (together with UAV expertise particularly) have been attributed to North Korea-aligned APT teams, with Operation North Star (a marketing campaign presenting some overlap with Operation DreamJob) being one in all them. In 2020, ESET researchers documented an analogous marketing campaign, which we then named Operation In(ter)ception and later attributed to Lazarus with excessive confidence. As a number of teams associated to Lazarus have been formally linked to North Korean intelligence companies by US authorities and others, these precedents strongly recommend that cyberespionage is probably going one of many instruments leveraged by the regime for reverse engineering Western UAVs – and that teams working beneath the broad Lazarus umbrella are taking an energetic half on this effort.
On this context, we imagine that it’s seemingly that Operation DreamJob was – at the very least partially – geared toward stealing proprietary data, and manufacturing know-how, relating to UAVs. The Drone point out noticed in one of many droppers considerably reinforces this speculation.
To be clear, we will solely hypothesize as to the precise form of data that Operation DreamJob was after. Nonetheless, we’ve got discovered proof that one of many focused entities is concerned within the manufacturing of at the very least two UAV fashions which might be presently employed in Ukraine, and which North Korea might have encountered on the frontline. This entity can also be concerned within the provide chain of superior single-rotor drones (i.e., unmanned helicopters), a sort of plane that Pyongyang is actively growing however has not proved capable of militarize to this point. These could also be among the potential motivations behind Operation DreamJob’s noticed actions. Extra usually, as North Korea is reportedly within the means of constructing a manufacturing unit for mass-producing UAVs, it may additionally be in search of privileged information relating to UAV-related industrial processes and manufacturing methods.
Toolset
Reviews from Google’s Mandiant in September 2024 and from Kaspersky in December 2024 describe instruments utilized by Lazarus in its Operation DreamJob in 2024. On this part, we point out the instruments to which the group shifted in Operation DreamJob in 2025. Primarily based on their place within the execution chain, we distinguish two varieties of instruments: early levels that consist of assorted droppers, loaders, and downloaders; and the primary levels that signify payloads like RATs and sophisticated downloaders that give the attackers enough management over the compromised machine.
In addition to the in-the-wild instances seen in ESET telemetry, the exercise of the attackers additionally manifested as VirusTotal submissions occurring on the similar time. A trojanized MuPDF reader, QuanPinLoader, a loader disguised as a Microsoft DirectInput library (dinput.dll), and a variant of ScoringMathTea had been submitted from Italy in April and June 2025; BinMergeLoader was submitted in August 2025 from Spain.
Droppers, loaders, and downloaders
Typically, Lazarus attackers are extremely energetic and deploy their backdoors towards a number of targets. This frequent use exposes these instruments and permits them to turn into detected. As a countermeasure, the group’s instruments are preceded within the execution chain by a collection of droppers, loaders, and easy downloaders. Sometimes, the loaders used search for the following stage on the file system or within the registry, decrypt it utilizing AES-128 or ChaCha20, and manually load it in reminiscence through the routines applied within the MemoryModule library; a dropper is principally a loader however accommodates the following stage embedded in its physique. The primary payload, ScoringMathTea in all instances noticed, isn’t current on the disk in unencrypted type. Instance execution chains are seen in Determine 1. In some instances, the attackers additionally deployed a fancy downloader that we name BinMergeLoader, which has similarities to the MISTPEN malware reported by Google’s Mandiant. BinMergeLoader leverages the Microsoft Graph API and makes use of Microsoft API tokens for authentication.
The attackers determined to include their malicious loading routines into open-source tasks obtainable on GitHub. The selection of venture varies from one assault to a different. In 2025, we noticed the next malware:
- Trojanized TightVNC Viewer and MuPDF reader that function downloaders.
- A trojanized end-of-life libpcre v8.45 library for Home windows, serving as a loader.
- A loader that has the Mandarin Chinese language image 样 (yàng within the Pinyin transliteration) as an icon within the sources. It additionally accommodates the string SampleIMESimplifiedQuanPin.txt, which means that it’s in all probability primarily based on the open-source venture Pattern IME, a TSF-based enter methodology editor demo. We name this QuanPinLoader.
- Loaders constructed from the open-source venture DirectX Wrappers.
- Downloaders constructed from open-source plugins for WinMerge (DisplayBinaryFiles and HideFirstLetter). We name the 2 trojanized plugins BinMergeLoader.
- Trojanized open-source plugins for Notepad++, particularly a downloader similar to BinMergeLoader (NPPHexEditor v10.0.0 by MacKenzie Cumings) and a dropper of an unknown payload (ComparePlus v1.1.0 by Pavel Nedev). The latter binary accommodates the PDB path E:WorkTroy안정화wksprtcomparePlus-masterNotepad++pluginsComparePlusComparePlus.pdb, which suggests the origin of the venture (comparePlus-master) and its meant legit father or mother course of (wksprt). Additionally, 안정화 means steady in Korean, which signifies that the code was seemingly correctly examined and dependable.
One of many droppers (SHA-1: 03D9B8F0FCF9173D2964CE7173D21E681DFA8DA4) has the inner DLL identify DroneEXEHijackingLoader.dll and is disguised as a Home windows Internet Providers Runtime library in an effort to be efficiently side-loaded; see Determine 2. We imagine that the substring drone is there to designate each a UAV machine and the attacker’s inside marketing campaign identify.

Desk 1 exhibits a typical mixture of legit executable recordsdata (EXEs) and malicious dynamic hyperlink libraries (DLLs) delivered to the sufferer’s system (that is analogous to Desk 1 in our blogpost on an assault towards a Spanish aerospace firm in 2023). The DLLs within the third column are both trojanized open-source purposes (see the fourth column for the underlying venture) or a standalone malware binary with out such benign context, with a legit EXE side-loading it. The placement folder (the primary column) is uncommon for such legit purposes. Malicious DLLs use the DLL proxying approach, so as to not break the execution. Subsequently, when a DLL can also be a trojanized venture, it accommodates two heterogeneous varieties of exports: first the set of features required for DLL proxying, and second the set of features exported from the open-source venture.
Desk 1. Abstract of binaries concerned within the assault
| Location folder | Professional father or mother course of | Malicious side-loaded DLL | Trojanized venture (payload) |
| N/A | wksprt.exe* | webservices |
ComparePlus v1.1.0 (N/A) |
|
%ALLUSERSPROFILEpercentEMC %ALLUSERSPROFILEpercentAdobe |
wksprt.exe | webservices |
Standalone (ScoringMathTea) |
| %ALLUSERSPROFILE% | wkspbroker.exe | radcui.dll | DirectX wrappers d3d8.dll/ddraw.dll (ScoringMathTea) |
| %APPDATApercentMicrosoftRemoteApp | wkspbroker.exe | radcui.dll | Standalone (BinMergeLoader) |
* Denotes a VirusTotal submission and its seemingly father or mother course of. The payload is unknown, since an extended command-line argument is required for its decryption from the trojanized venture.
ScoringMathTea
ScoringMathTea is a fancy RAT that helps round 40 instructions. Its identify is a mix of the basis ScoringMath, taken from a C&C area utilized by an early variant (www.scoringmnmathleague[.]org), and the suffix -Tea, which is ESET Analysis’s designation for a North Korea-aligned payload. It was first publicly documented by Kaspersky in April 2023 and later by Microsoft in October 2023 beneath the identify ForestTiger, which follows the inner DLL identify or the PDB data present in some samples.
Its first look might be traced again to VirusTotal submissions from Portugal and Germany in October 2022, the place its dropper posed as an Airbus-themed job supply lure. The applied performance is the standard required by Lazarus: manipulation of recordsdata and processes, exchanging the configuration, amassing the sufferer’s system information, opening a TCP connection, and executing native instructions or new payloads downloaded from the C&C server. The present model doesn’t present any dramatic modifications in its characteristic set or its command parsing. So the payload might be receiving steady, relatively minor enhancements and bug fixes.
Concerning ESET telemetry, ScoringMathTea was seen in assaults towards an Indian expertise firm in January 2023, a Polish protection firm in March 2023, a British industrial automation firm in October 2023, and an Italian aerospace firm in September 2025. Evidently it is likely one of the flagship payloads for Operation DreamJob campaigns, though Lazarus has extra refined payloads like LightlessCan at its disposal.
Conclusion
For practically three years, Lazarus has maintained a constant modus operandi, deploying its most popular essential payload, ScoringMathTea, and utilizing comparable strategies to trojanize open-source purposes. This predictable, but efficient, technique delivers enough polymorphism to evade safety detection, even whether it is inadequate to masks the group’s identification and obscure the attribution course of. Additionally, even with widespread media protection of Operation DreamJob and its use of social engineering, the extent of worker consciousness in delicate sectors – expertise, engineering, and protection – is inadequate to deal with the potential dangers of a suspicious hiring course of.
Though various hypotheses are conceivable, there are good causes to assume that this Operation DreamJob marketing campaign was in no small half meant to gather delicate data on UAV-related expertise. Contemplating North Korea’s present efforts at scaling up its drone business and arsenal, it appears seemingly that different organizations energetic on this sector will whet the urge for food of North Korea-aligned risk actors within the close to future.
For any inquiries about our analysis printed on WeLiveSecurity, please contact us at threatintel@eset.com.ESET Analysis affords non-public APT intelligence stories and knowledge feeds. For any inquiries about this service, go to the ESET Menace Intelligence web page.
IoCs
A complete checklist of indicators of compromise and samples might be present in our GitHub repository.
Recordsdata
SHA-1
Filename
Detection
Description
28978E987BC59E75CA22 562924EAB93355CF679E
TSMSISrv.dll
Win64/NukeSped.TL
QuanPinLoader.
5E5BBA521F0034D342CC 26DB8BCFECE57DBD4616
libmupdf.dll
Win64/NukeSped.TE
A loader disguised as a MuPDF rendering library v3.3.3.
B12EEB595FEEC2CFBF9A 60E1CC21A14CE8873539
radcui.dll
Win64/NukeSped.TO
A dropper disguised as a RemoteApp and Desktop Connection UI Part library.
26AA2643B07C48CB6943 150ADE541580279E8E0E
HideFirstLetter .DLL
Win64/NukeSped.TO
BinMergeLoader.
0CB73D70FD4132A4FF54 93DAA84AAE839F6329D5
libpcre.dll
Win64/NukeSped.TP
A loader that may be a trojanized libpcre library.
03D9B8F0FCF9173D2964 CE7173D21E681DFA8DA4
webservices.dll
Win64/NukeSped.RN
A dropper disguised as a Microsoft Internet Providers Runtime library.
71D0DDB7C6CAC4BA2BDE 679941FA92A31FBEC1FF
N/A
Win64/NukeSped.RN
ScoringMathTea.
87B2DF764455164C6982 BA9700F27EA34D3565DF
webservices.dll
Win64/NukeSped.RW
A dropper disguised as a Microsoft Internet Providers Runtime library.
E670C4275EC24D403E0D 4DE7135CBCF1D54FF09C
N/A
Win64/NukeSped.RW
ScoringMathTea.
B6D8D8F5E0864F5DA788 F96BE085ABECF3581CCE
radcui.dll
Win64/NukeSped.TF
A loader disguised as a RemoteApp and Desktop Connection UI Part library.
5B85DD485FD516AA1F44 12801897A40A9BE31837
RCX1A07.tmp
Win64/NukeSped.TH
A loader of an encrypted ScoringMathTea.
B68C49841DC48E367203 1795D85ED24F9F619782
TSMSISrv.dll
Win64/NukeSped.TL
QuanPinLoader.
AC16B1BAEDE349E48243 35E0993533BF5FC116B3
cache.dat
Win64/NukeSped.QK
A decrypted ScoringMathTea RAT.
2AA341B03FAC3054C576 40122EA849BC0C2B6AF6
msadomr.dll
Win64/NukeSped.SP
A loader disguised as a Microsoft DirectInput library.
CB7834BE7DE07F893520 80654F7FEB574B42A2B8
ComparePlus.dll
Win64/NukeSped.SJ
A trojanized Notepad++ plugin disguised as a Microsoft Internet Providers Runtime library. A dropper from VirusTotal.
262B4ED6AC6A977135DE CA5B0872B7D6D676083A
tzautosync.dat
Win64/NukeSped.RW
A decrypted ScoringMathTea, saved encrypted on the disk.
086816466D9D9C12FCAD A1C872B8C0FF0A5FC611
N/A
Win64/NukeSped.RN
ScoringMathTea.
2A2B20FDDD65BA28E7C5 7AC97A158C9F15A61B05
cache.dat
Win64/NukeSped.SN
A downloader just like BinMergeLoader constructed as a trojanized NPPHexEditor plugin.
Community
| IP | Area | Internet hosting supplier | First seen | Particulars |
| 23.111.133[.]162 | coralsunmarine[.]com | HIVELOCITY, Inc. | 2024-06-06 | ScoringMathTea C&C server: https://coralsunmarine[.]com/wp-content/themes/flatsome/inc/features/function-hand.php |
| 104.21.80[.]1 | kazitradebd[.]com | Cloudflare, Inc. | 2025-01-11 | ScoringMathTea C&C server: https://kazitradebd[.]com/wp-content/themes/hello-elementor/consists of/customizer/customizer-hand.php |
| 70.32.24[.]131 | oldlinewoodwork |
A2 Internet hosting, Inc. | 2024-06-14 | ScoringMathTea C&C server: https://oldlinewoodwork[.]com/wp-content/themes/zubin/inc/index.php |
| 185.148.129[.]24 | www.mnmathleague |
A2 Internet hosting, Inc. | 2024-06-15 | ScoringMathTea C&C server: https://www.mnmathleague[.]org/ckeditor/adapters/index.php |
| 66.29.144[.]75 | pierregems[.]com | Namecheap, Inc. | 2024-08-11 | ScoringMathTea C&C server: https://pierregems[.]com/wp-content/themes/woodmart/inc/configs/js-hand.php |
| 108.181.92[.]71 | www.scgestor.com[.]br | Psychz Networks | 2024-07-15 | ScoringMathTea C&C server: https://www.scgestor.com[.]br/wp-content/themes/vantage/inc/template-headers.php |
| 104.247.162[.]67 | galaterrace[.]com | GNET Web Telekomunikasyon A.S. | 2024-06-27 | ScoringMathTea C&C server: https://galaterrace[.]com/wp-content/themes/hello-elementor/consists of/features.php |
| 193.39.187[.]165 | ecudecode[.]mx | Heymman Servers Company | 2025-05-14 | ScoringMathTea C&C server: https://ecudecode[.]mx/redsocial/wp-content/themes/buddyx/inc/Customizer/usercomp.php |
| 172.67.193[.]139 | www.anvil.org[.]ph | Cloudflare, Inc. | 2025-02-22 | ScoringMathTea C&C server: https://www.anvil.org[.]ph/checklist/pictures/index.php |
| 77.55.252[.]111 | partnerls[.]pl | Nazwa.pl Sp.z.o.o. | 2025-06-02 | ScoringMathTea C&C server: https://partnerls.pl/wp-content/themes/public/index.php |
| 45.148.29[.]122 | trainingpharmacist |
Webdock.io ApS | 2024-06-13 | ScoringMathTea C&C server: https://trainingpharmacist.co.uk/bootstrap/bootstrap.php |
| 75.102.23[.]3 | mediostresbarbas |
DEFT.COM | 2024-06-05 | ScoringMathTea C&C server: https://mediostresbarbas.com[.]ar/php_scrip/banahosting/index.php |
| 152.42.239[.]211 | www.bandarpowder |
DigitalOcean, LLC | 2024-09-19 | ScoringMathTea C&C server: https://www.bandarpowder[.]com/public/belongings/buttons/bootstrap.php |
| 95.217.119[.]214 | spaincaramoon |
Hetzner On-line GmbH | 2025-04-30 | ScoringMathTea C&C server: https://spaincaramoon[.]com/realestate/wp-content/plugins/gravityforms/ahead.php |
MITRE ATT&CK methods
This desk was constructed utilizing model 17 of the MITRE ATT&CK framework.
|
Tactic |
ID |
Identify |
Description |
|
Useful resource Growth |
Compromise Infrastructure: Server |
ScoringMathTea makes use of compromised servers for C&C. |
|
|
Develop Capabilities: Malware |
All levels within the assault had been seemingly developed by the attackers. |
||
|
Execution |
Native API |
Home windows APIs are important for ScoringMathTea to perform and are resolved dynamically at runtime. |
|
|
Shared Modules |
ScoringMathTea is ready to load a downloaded DLL with the exports fun00 or exportfun00. |
||
|
Person Execution: Malicious File |
Lazarus attackers relied on the execution of trojanized PDF readers. |
||
|
Persistence |
Hijack Execution Movement: DLL Facet-Loading |
Trojanized droppers (webservices.dll, radcui.dll) use legit packages (wksprt.exe, wkspbroker.exe) for his or her loading. |
|
|
Protection Evasion |
Entry Token Manipulation: Create Course of with Token |
ScoringMathTea can create a brand new course of within the safety context of the consumer represented by a specified token. |
|
|
Deobfuscate/Decode Recordsdata or Info |
The primary payload, ScoringMathTea, is at all times encrypted on the file system. |
||
|
Obfuscated Recordsdata or Info: Dynamic API Decision |
ScoringMathTea resolves Home windows APIs dynamically. |
||
|
Obfuscated Recordsdata or Info: Embedded Payloads |
The droppers of all malicious chains comprise an embedded knowledge array with a further stage. |
||
|
Reflective Code Loading |
The droppers and loaders use reflective DLL injection. |
||
|
Course of Injection |
ScoringMathTea and BinMergeLoader can reflectively load a DLL within the course of specified by the PID. |
||
|
Discovery |
File and Listing Discovery |
ScoringMathTea can find a file by its identify. |
|
|
Course of Discovery |
ScoringMathTea can checklist all operating processes. |
||
|
System Info Discovery |
ScoringMathTea can mimic the ver command. |
||
|
Command and Management |
Utility Layer Protocol: Internet Protocols |
ScoringMathTea and BinMergeLoader use HTTP and HTTPS for C&C. |
|
|
Encrypted Channel: Symmetric Cryptography |
ScoringMathTea encrypts C&C visitors utilizing the IDEA algorithm and BinMergeLoader utilizing the AES algorithm. |
||
|
Knowledge Encoding: Commonplace Encoding |
ScoringMathTea provides a base64-encoding layer to its encrypted C&C visitors. |
||
|
Exfiltration |
Exfiltration Over C2 Channel |
ScoringMathTea can exfiltrate knowledge to its C&C server. |

