New Kimsuky Malware "EndClient RAT": Technical Report and IOCs

Nov. 7, 2025, 10:10 a.m.

Description

A novel Remote Access Trojan (RAT) called 'EndClient RAT' has been discovered targeting North Korean Human Rights Defenders. The malware, attributed to the Kimsuky group, is delivered via a signed Microsoft Installer package disguised as 'StressClear.msi'. It uses AutoIT scripts for execution and establishes persistence through scheduled tasks and startup folder entries. The RAT communicates with a command and control server using a custom protocol with JSON markers. It has capabilities for remote shell access, file upload/download, and system information gathering. The malware employs in-memory modules for binary search, Base64 encoding/decoding, and LZMA decompression. Detection rates for this malware are currently low, making public disclosure crucial for protecting affected communities.

Date

  • Created: Nov. 7, 2025, 9:08 a.m.
  • Published: Nov. 7, 2025, 9:08 a.m.
  • Modified: Nov. 7, 2025, 10:10 a.m.

Indicators

  • dfad5a2324e4bde8ba232d914fcea4c7c765992951eb933264fe1a2aaa8da164
  • bcdd8a213cf6986bad4bb487fe1bf798e159d32fd3a88b4e8d2945403d1c428d
  • 7107c110e4694f50a39a91f8497b9f0e88dbe6a3face0d2123a89bcebf241a1d

Attack Patterns

  • EndClient RAT
  • Kimsuky

Additional Informations

  • NGO