Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
kkRAT Employs Network Communication Protocol to Steal Clipboard Contents

kkRAT Employs Network Communication Protocol to Steal Clipboard Contents

Posted on September 11, 2025September 11, 2025 By CWS

In early Could 2025, cybersecurity researchers started monitoring a novel Distant Entry Trojan (RAT) concentrating on Chinese language-speaking customers through phishing websites hosted on GitHub Pages.

Masked as authentic installers for in style functions, the preliminary ZIP archives contained malicious executables engineered to bypass sandbox and digital machine defenses.

As soon as executed, the first-stage shellcode performs time stability evaluation utilizing QueryPerformanceCounter and examines {hardware} configurations—disk area and CPU cores—to establish evaluation environments and terminate if suspicions come up.

Assault chain (Supply – Zscaler)

This meticulous evasion technique ensures that kkRAT not often triggers alerts throughout automated detonation.

Over the following levels, kkRAT deploys superior anti-analysis strategies, dynamically resolving Home windows API features via single-byte XOR obfuscation and decrypting subsequent shellcodes with easy XOR transforms.

Within the second stage, the malware unloads and disables community adapters to sever AV/EDR communications, enumerates processes related to Chinese language safety distributors, and employs a weak driver (RTCore64.sys) to take away registered callbacks from kernel-mode defenses.

Zscaler analysts famous that kkRAT even alters registry values for 360 Complete Safety to disable community checks and schedules duties underneath SYSTEM privileges to repeatedly kill safety processes upon consumer logon.

By the third stage, kkRAT retrieves a closely obfuscated shellcode named 2025.bin from hardcoded URLs, decodes Base64-encoded directions in output.log, and selects obtain URLs primarily based on the sufferer course of’s filename.

The extracted archives include authentic executables sideloaded with malicious DLLs that decrypt the ultimate payload—kkRAT itself—utilizing a six-byte XOR key at offset 0xD3000.

Zscaler researchers recognized this seamless use of sideloading to deploy a number of RAT variants, together with ValleyRAT and FatalRAT, however the newly found kkRAT blended options from each Ghost RAT and Huge Dangerous Wolf.

In its operation, kkRAT establishes a TCP connection to its command-and-control server, compresses knowledge through zlib, and applies a further XOR-based encryption layer.

Phishing web page impersonating Ding Discuss (Supply – Zscaler)

A pattern Python snippet used to decrypt captured visitors demonstrates this two-phase course of:-

import zlib
def decrypt_packet(knowledge, key):
compressed = bytes(b ^ key for b in knowledge)
return zlib.decompress(compressed)

An infection Mechanism

Upon execution of the sideloaded DLL, kkRAT reads its encrypted configuration—C2 IP, port, model, and group identifier—and constructs a REGISTRATIONINFO struct containing detailed gadget fingerprints corresponding to OS model, CPU frequency, reminiscence measurement, put in antivirus signatures, and the presence of messaging functions.

This thorough profile permits attackers to prioritize high-value targets. Uniquely, kkRAT inspects the clipboard for cryptocurrency pockets addresses (Bitcoin, Ethereum, Tether) and replaces them with attacker-controlled addresses through the 0x4D command, a tactic designed to hijack transactions silently.

As soon as persistence is established via startup folder shortcuts or registry run keys, kkRAT stays resident, awaiting additional directions to load plugins—starting from distant desktop administration to course of termination—and relay community visitors via Go-based SOCKS5 proxies.

By way of its layered encryption, subtle anti-analysis checks, and monetary theft capabilities, kkRAT represents a major evolution in commodity RAT toolkits, underscoring the persistent menace of supply-chain fashion malware supply.

Increase your SOC and assist your crew shield your corporation with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Clipboard, Communication, Contents, Employs, kkRAT, Network, Protocol, Steal

Post navigation

Previous Post: UK Train Operator LNER Warns Customers of Data Breach
Next Post: Cisco Patches High-Severity IOS XR Vulnerabilities

Related Posts

Malware Mastermind Andrei Tarasov Evades US Extradition Returns to Russia Malware Mastermind Andrei Tarasov Evades US Extradition Returns to Russia Cyber Security News
Top 10 Best API Penetration Testing Companies In 2025 Top 10 Best API Penetration Testing Companies In 2025 Cyber Security News
Link11 Identifies Five Cybersecurity Trends Shaping European Defense Strategies in 2026 Link11 Identifies Five Cybersecurity Trends Shaping European Defense Strategies in 2026 Cyber Security News
Threat Actors Attacking Outlook and Google Bypassing Traditional Email Defenses Threat Actors Attacking Outlook and Google Bypassing Traditional Email Defenses Cyber Security News
Criminal IP to Showcase ASM and CTI Innovations at GovWare 2025 in Singapore Criminal IP to Showcase ASM and CTI Innovations at GovWare 2025 in Singapore Cyber Security News
French Officials Raid X for Alleged Cybercrime Activities French Officials Raid X for Alleged Cybercrime Activities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks
  • Cyber Threats Concealed by Compromised IoT Devices
  • 287 Chrome Extensions Breach Privacy of Millions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks
  • Cyber Threats Concealed by Compromised IoT Devices
  • 287 Chrome Extensions Breach Privacy of Millions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News