KimJongRAT Variants: Malware Comedy of Errors or Cybersecurity Nightmare?
KimJongRAT is back with a comedic twist! These new variants are like malware’s version of the Swiss Army knife—one uses a PE file, the other, PowerShell, both with the elegance of a digital ninja. They gather victim data, including crypto-wallet details, and send it to attackers, proving once again that cybercriminals are always in season!

Hot Take:
The KimJongRAT is like that persistent ex who just won’t stay gone! It keeps coming back sneakier and more equipped, now with a PE and PowerShell variant. The real question is, will it finally learn how to just chill? Probably not, but hey, security folks love a good chase, right?
Key Points:
- KimJongRAT has evolved into two new variants using PE files and PowerShell.
- Both variants use LNK files to initiate the attack by downloading malicious files from a CDN.
- The PE variant collects a wide range of data, including FTP and email client info.
- The PowerShell variant targets browser data, focusing on crypto-wallet extensions.
- Palo Alto Networks provides protection against these threats with their advanced security features.
Already a member? Log in here