Konni
Description
Konni is a remote administration tool, observed in the wild since early 2014. The Konni malware family is potentially linked to APT37, a North-Korean cyber espionage group active since 2012. The group primary victims are South-Korean political organizations, as well as Japan, Vietnam, Russia, Nepal, China, India, Romania, Kuwait, and other parts of the Middle East.
Names
Name |
---|
Konni |
Category
Malware
Type
- Backdoor
- Info stealer
Information
- https://blog.talosintelligence.com/2017/05/konni-malware-under-radar-for-years.html
- https://blog.fortinet.com/2017/08/15/a-quick-look-at-a-new-konni-rat-variant
- https://vallejo.cc/2017/07/08/analysis-of-new-variant-of-konni-rat/
- http://blog.talosintelligence.com/2017/07/konni-references-north-korean-missile-capabilities.html
- https://us-cert.cisa.gov/ncas/alerts/aa20-227a
- https://blog.malwarebytes.com/threat-intelligence/2022/01/konni-evolves-into-stealthier-rat/
- https://medium.com/@DCSO_CyTec/to-russia-with-love-assessing-a-konni-backdoored-suspected-russian-consular-software-installer-ce618ea4b8f3
Mitre Attack
Malpedia
Alienvault Otx
Other Information
Uuid
d238a221-2a1d-4558-9dbf-7a3a6bbb0d22
Last Card Change
2024-03-07