Information about the South Korean banks and media systems attacks

March 20, 2013  |  Jaime Blasco

As many of you would probably know several South Korean banks and media companies have been affected by an attack that has wiped several systems.

It seems the South Korean security company Nshc has published more details on his Facebook Page

Based on the samples we collected, the malware overwrites the MBR (Master Boot Record) of the system. After reboot the system can’t boot anymore.

The samples use the word “HASTATI” to overwrite the MBR data:



And then shuts down the system using:

shutdown -r -t 0

We have seen that the samples checks for the presence of several security tools:

AhnLab Policy Agent - pasvc.exe

Hauri ViRobot - clisvc.exe

And tries to kill them using taskkill:

taskkill /F /IM pasvc.exe

taskkill /F /IM clisvc.exe

Within the samples we found references to three words:




According to Wikipedia. “Hastati (singular: Hastatus) were a class of infantry in the armies of the early Roman Republic who originally fought as spearmen, and later as swordsmen. They were originally some of the poorest men in the legion, and could afford only modest equipment—light armour and a large shield, in their service as the lighter infantry of the legion. Later, the hastati contained the younger men rather than just the poorer, though most men of their age were relatively poor. Their usual position was the first battle line. They fought in a quincunx formation, supported by light troops. They were eventually done away with after the Marian reforms of 107 BC”

Related samples:

ApcRunCmd.exe db4bbdc36a78a8807ad9b15a562515c4

OthDown.exe 5fcd6e1dace6b0599429d913850f0364



Share this with others


Featured resources



2024 Futures Report

Get price Free trial