KimJongRAT

Description

(Palo Alto) As the original filename “cow_pass.fig” suggests, KimJongRAT seems to be wholly used as a password extraction and information stealer tool by the threat actor, and the collected data are exfiltrated to C2 with support from other malware such as BabyShark or Gh0st RAT. The information that the KimJongRAT malware steals from victim machines include email credentials from Microsoft Outlook and Mozilla Thunderbird, login credentials for Google, Facebook, and Yahoo accounts from browsers Internet Explorer, Chrome, Mozilla Firefox, and Yandex Browser.

Names

Name
KimJongRAT

Category

Malware

Type

  • Backdoor
  • Info stealer
  • Credential stealer
  • Exfiltration

Information

Malpedia

Alienvault Otx

Other Information

Uuid

1981c06c-cc55-4efe-99e1-ac799d04d3b6

Last Card Change

2021-04-24