Kimsuky's Ongoing Evolution of KimJongRAT and Expanding Threats

Nov. 24, 2025, 12:49 p.m.

Description

This analysis examines the latest attack flow of the KimJongRAT variant, attributed to the North Korean threat actor Kimsuky. The malware has evolved to include both PE-based and PowerShell-based attack chains, which have been merged into a single workflow. The attackers use phishing emails for initial access, leveraging GitHub and Google Drive for malware distribution. The malware exfiltrates sensitive data including browser credentials, system information, and keystrokes. Additional activities by the same actor include credential theft through phishing sites and spear-phishing campaigns targeting South Korean users. The analysis provides evidence supporting the attribution to Kimsuky and highlights the ongoing development of variants and infrastructure, indicating successful attacks.

Date

  • Created: Nov. 24, 2025, 11:59 a.m.
  • Published: Nov. 24, 2025, 11:59 a.m.
  • Modified: Nov. 24, 2025, 12:49 p.m.

Indicators

  • 7f4fc97870f4442477c9aafdb2523187b3026d73de30e9f90593b1ab0ce31da3
  • 5f04f60907089503730c6e31e4a5a8927d42e864168ec64556dfd8bcf2086a47
  • c24353e61826eb7187d1acabbd857ddb694ddfe130eb1f5195aadd39701565ca
  • 27.102.113.20
  • 27.102.113.170
  • 142.11.248.98
  • 183.111.226.13
  • 27.102.113.107
  • 27.102.113.209
  • nid-naverbpk.onthewifi.com
  • natezlx.myvnc.com
  • daumcyd.ddns.net
  • cdn.glitch.global

Attack Patterns

Additional Informations

  • Finance
  • Government