New Kimsuky Malware "EndClient RAT": Technical Report and IOCs
Nov. 7, 2025, 10:10 a.m.
Description
A novel Remote Access Trojan (RAT) called 'EndClient RAT' has been discovered targeting North Korean Human Rights Defenders. The malware, attributed to the Kimsuky group, is delivered via a signed Microsoft Installer package disguised as 'StressClear.msi'. It uses AutoIT scripts for execution and establishes persistence through scheduled tasks and startup folder entries. The RAT communicates with a command and control server using a custom protocol with JSON markers. It has capabilities for remote shell access, file upload/download, and system information gathering. The malware employs in-memory modules for binary search, Base64 encoding/decoding, and LZMA decompression. Detection rates for this malware are currently low, making public disclosure crucial for protecting affected communities.
Tags
Date
- Created: Nov. 7, 2025, 9:08 a.m.
- Published: Nov. 7, 2025, 9:08 a.m.
- Modified: Nov. 7, 2025, 10:10 a.m.
Indicators
- dfad5a2324e4bde8ba232d914fcea4c7c765992951eb933264fe1a2aaa8da164
- bcdd8a213cf6986bad4bb487fe1bf798e159d32fd3a88b4e8d2945403d1c428d
- 7107c110e4694f50a39a91f8497b9f0e88dbe6a3face0d2123a89bcebf241a1d
Attack Patterns
- EndClient RAT
- Kimsuky
Additional Informations
- NGO