Also known as: Velvet Chollima, THALLIUM, Emerald Sleet, Black Banshee, APT43, Archipelago, SharpTongue, TA406, Springtail, TA427, Sparkling Pisces, Kimsuki, Baby Coin
T1598.003
T1204.001
T1204.002
T1059.005
T1059.006
T1071.001
T1102
T1056.001
T1114.002
T1539
T1583.001
T1598
T1056.003
T1562.004
T1550.002
T1588.006
T1534
T1185
T1567.002
T1608.001
T1608.004
T1608.005
T1589.002
T1591
T1593
T1594
T1213
VBScript-based reconnaissance tool that exfiltrates system information via HTTP. Used as initial access payload in spear-phishing campaigns targeting think tanks and policy researchers.
Full-featured backdoor supporting keylogging, screenshot capture, file exfiltration, and additional module loading. Primary persistent access tool in Kimsuky campaigns.
Reconnaissance tool delivered via weaponized documents. Exfiltrates system configuration, running processes, and battery info to determine if target is worth further exploitation.
Malicious Chromium browser extension that reads email directly from the victim's webmail (Gmail, AOL, Yahoo). Bypasses 2FA since it operates within the authenticated browser session.
Multi-component backdoor that uses a dedicated module for stealing credentials. Operates with a dropper, injector, and payload architecture for modular deployment.
PowerShell-based reconnaissance and data collection tool. Gathers system info, installed programs, recent documents, and sends data to attacker-controlled cloud services.
VBScript info-stealer that collects file listings from specific directories. Targets document files to identify intelligence value before deploying heavier payloads.
Android spyware disguised as a security plugin. Captures SMS, call logs, GPS location, and can exfiltrate files from the device. Targets South Korean mobile users.
Abused as C2 channel — malware uploads stolen data to attacker-controlled Google Drive accounts and retrieves commands from shared documents.
Used as file exfiltration channel, with stolen documents and credentials uploaded to attacker-controlled OneDrive accounts to blend with normal cloud traffic.
Used for command-and-control communication, storing encoded commands and receiving exfiltrated data through the Dropbox API.
Used extensively for executing encoded reconnaissance scripts, downloading secondary payloads, and credential harvesting from browser stores.
HTML Application host abused to execute HTA files containing VBScript or JScript payloads, bypassing application whitelisting controls.
Abused for persistent remote access after initial compromise. Legitimate Google tool that's difficult for defenders to distinguish from authorized usage.
Open-source .NET RAT used as a lightweight remote access tool in some Kimsuky campaigns, providing screen control, file management, and keylogging.
Remote access trojan with keylogging and screen capture capabilities
Information stealer targeting browser credentials and email data
Legitimate Metasploit Framework payload used by Kimsuky for post-exploitation
Second-stage malware with command execution capabilities
Malware designed to steal clipboard data including cryptocurrency wallet addresses
| Type | Value |
|---|---|
| domain | bigfile[.]pe[.]hu |
| domain | mybobo[.]mygamesonline[.]org |
| ip | 27[.]102[.]114[.]89 |
| ip | 158[.]247[.]222[.]165 |
| hash | 7d0e57a3c12a8e7c0f16e52b3a6e0d5e |
| ip | 27[.]102[.]137[.]181 |
| ip | 158[.]247[.]215[.]121 |
| ip | 158[.]247[.]204[.]137 |
| ip | 158[.]247[.]192[.]226 |
| ip | 158[.]247[.]242[.]206 |
| domain | kzloly[.]nmailhub[.]com |
| hash | 10c3b3ab2e9cb618fc938028c9295ad5bdb1d836b8f07d65c0d3036dbc18bbb4 |
| hash | 509fb00b9d6eaa74f54a3d1f092a161a095e5132d80cc9cc95c184d4e258525b |
| domain | naver[.]kro[.]kr |
| domain | daum[.]kro[.]kr |
| domain | myaccount-help[.]com |
| domain | appleid-unlock[.]com |
| hash | 4c3499f3cc4a4fdc7e67c5e45eb1e93b4e5e5e2e1e0e3c1e9b9c8f7e6d5c4b3a |
| domain | auth-sso[.]com |
| ip | 185[.]244[.]39[.]224 |
| Domain / Host | Status |
|---|---|
bigfile[.]pe[.]huC2 domain used in South Korean government targeting | offline |
mybobo[.]mygamesonline[.]orgBabyShark C2 infrastructure | offline |
27[.]102[.]114[.]89Infrastructure linked to AppleSeed campaigns | offline |
158[.]247[.]222[.]165ReconShark C2 server | active |
kzloly[.]nmailhub[.]com | offline |
Infrastructure data reflects monitoring status only — no raw fingerprint data is exposed.
MITRE ATT&CK - Kimsuky
https://attack.mitre.org/groups/G0094/
CISA - North Korean State-Sponsored Cyber Actors Use Social Engineering to Enable Hacking
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-152a
Mandiant - APT43: North Korean Group Uses Cybercrime to Fund Espionage Operations
https://www.mandiant.com/resources/apt43-north-korea-cybercrime-espionage
FBI Flash Alert: North Korean Actors Use Malicious QR Codes (Quishing)
https://thehackernews.com/2026/01/fbi-warns-north-korean-hackers-using.html
Kimsuky Spreads DocSwap Android Malware via QR Phishing
https://thehackernews.com/2025/12/kimsuky-spreads-docswap-android-malware.html
GenDigital: DPRK's Playbook - Kimsuky's HttpTroy and Lazarus BLINDINGCAN
https://www.gendigital.com/blog/insights/research/dprk-kimsuky-lazarus-analysis
ENKI: Kimsuky's Ongoing Evolution of KimJongRAT
https://securityonline.info/kimsuky-apt-deploys-dual-kimjongrat-payloads-switching-between-pe-powershell-based-on-windows-defender-status/
Kimsuky APT Exposed: June 2025 Data Leak Analysis
https://gbhackers.com/kimsuky-apt-exposed/
Microsoft: Emerald Sleet Uses ClickFix Tactic
https://www.helpnetsecurity.com/2025/02/13/north-korean-hackers-spotted-using-clickfix-tactic-to-deliver-malware/
Proofpoint: TA427's Art of Information Gathering and DMARC Abuse
https://www.proofpoint.com/us/blog/threat-insight/social-engineering-dmarc-abuse-ta427s-art-information-gathering
AhnLab: Larva-24005 Campaign Exploits BlueKeep RDP Vulnerability
https://securityaffairs.com/186755/intelligence/north-korea-linked-apt-kimsuky-behind-quishing-attacks-fbi-warns.html
STOLEN PENCIL Campaign Targets Academia
https://www.netscout.com/blog/asert/stolen-pencil-campaign-targets-academia
Kimsuky APT continues to target South Korean government using AppleSeed backdoor
https://blog.malwarebytes.com/threat-intelligence/2021/06/kimsuky-apt-continues-to-target-south-korean-government-using-appleseed-backdoor/
Kimsuky's GoldDragon cluster and its C2 operations
https://www.sentinelone.com/labs/kimsuky-golddragon-cluster/
North Korean Kimsuky APT Targets Journalists
https://www.proofpoint.com/us/blog/threat-insight/north-korean-kimsuky-apt-targets-journalists
APT43: North Korean Group Combines Cybercrime and Espionage
https://cloud.google.com/blog/topics/threat-intelligence/apt43-north-korea-cybercrime-espionage