Skip to main content
Blog

Securonix Threat Research (STR) Monthly Newsletter – November 2025 Edition –

  • December 3, 2025
  • 0 replies
  • 53 views

Securonix Threat Research (STR) Monthly Newsletter

– November 2025 Edition –

 

Welcome back to another newsletter by the Securonix Threat Research Team!

November has been a month of a LOT of reverse engineering. The team has been grabbing malware samples from multiple sources to find novel and interesting techniques and indicators to share with the community. Our team has also been featured and seen this month during the FS-ISAC EMEA webinar where Shikha Sangwan presented her findings for CHAMELEON#NET. We provided commentary on the latest Kimsuky & Lazarus Tooling, Evolving ClickFix Attacks, the recent Government Compromise, CISA 2015 Reauthorization, Chinese using Claude to “AutoAttack”,  XWiki CVE-2025-24893, and Legacy Firewall Attacks.

 

We also now have Securonix Connect to share these ideas and updates in a more streamlined way! Oftentimes, news outlets summarize a lot of our commentary but now we have a place in the Connect to share our thoughts and interact with anyone who has feedback or questions. Pretty cool stuff right there!

 

New Threat Research

 

In the month of November, we followed a malware strain that demonstrates advanced evasion techniques through a sophisticated four-stage attack chain designed to bypass traditional endpoint detection. The infection begins with a simple batch file dropper that executes a PowerShell script, which downloads a seemingly innocuous Death Note anime wallpaper from Archive.org. Hidden within this 2.3MB JPEG file is a base64-encoded .NET assembly concealed using steganographic markers, which the PowerShell script extracts and loads directly into memory without ever touching disk. This assembly then downloads a text file containing a reversed and base64-encoded payload, which undergoes a final XOR decryption (key: 0x8A4A) before being injected into a legitimate Windows process (cvtres.exe) using process hollowing techniques. Notably, the malware never writes a malicious executable to disk at any stage—all decoding, decryption, and execution occurs entirely in memory, allowing it to bypass file-based antivirus solutions, file integrity monitoring, and forensic analysis. The attack chain leverages multiple layers of obfuscation including string reversal, base64 encoding, steganography, XOR encryption, and ultimately process hollowing, representing a sophisticated threat that requires behavioral detection and memory analysis capabilities to identify and prevent. This research led to a whole host of IOCs for Autonomous Threat Sweeper (ATS) along with prototype detection submissions.

 

 

Threat Tactics covered by New Security Content

 

Our team continuity monitors current and active threats.  From a research focused standpoint, detections have been created based on relevant TTPs (Tactics Techniques and Procedures) of recent critical real-world threats for the following malware, vulnerabilities or threat families:

 

AI-enabled malware, APT, CVE-2025-24893, ClassLibrary1, Cryptominer, EndClientRAT, FilelessMalware, Groovy_Injection, Kimsuky, LLM abuse, Microsoft.Win32.TaskScheduler.dll, NamedPipe, Obfuscation, PROMPTFLUX, PhantomStealer, ProcessHollowing, Resource_Hijacking, RetryLogic, Reverse_Shell, RondoDox, Steganography, TinyBanker, WormGPT, XMRig, XWiki, Zusy, attack.command_and_control, attack.defense_evasion, attack.execution, attack.impact, attack.initial_access, attack.lateral_movement, attack.t1021.004, attack.t1027, attack.t1027.003, attack.t1027.010, attack.t1055, attack.t1055.012, attack.t1059, attack.t1059.004, attack.t1071, attack.t1071.001, attack.t1102, attack.t1190, attack.t1496, metamorphic malware 

 

Analytics and Highlights of New Security Content 

Here are the latest metrics which correlate our outputs with real-world threats. This section covers new detection content as well as attack indicators provided as inputs for our ATS, hunting, and other teams 

for the month of November.

 

 

Category 

Count 

Security detection content (rules submitted to CTA) 

7

Security detection content (rules enhanced/updated) 

3

Unique IPs

28

Unique URLs

433

Unique Hashes

261

Unique Published Indicators provided by Threat Research

722

 

 

– The Current Threat Landscape – 

 

November 2025 continued the concerning trajectory of sophisticated cyberattacks targeting organizations globally, with significant incidents impacting critical infrastructure, financial services, and technology sectors. The month was characterized by:

  • Record-breaking breaches: Major incidents affecting DoorDash, Logitech, London Councils, and a $120M DeFi exploit
  • Active exploitation: One Windows kernel zero-day and multiple critical vulnerabilities in enterprise infrastructure
  • Ransomware evolution: Shift toward data exfiltration over encryption, with 50% of attacks targeting critical sectors
  • AI-weaponization: Increased use of generative AI for sophisticated phishing and social engineering campaigns

The average cost per data breach reached $4.45 million [1], while ransomware insurance claims surged 68% to an average of $353,000 [2].

 

[1] Astra Security Blog. "Recent Cyber Attacks - 2025." https://www.getastra.com/blog/security-audit/recent-cyber-attacks/

[2] NordLayer. "8 of the Biggest Ransomware Attacks of 2025." https://nordlayer.com/blog/ransomware-attacks-2025/

 

Kimsuky EndClient RAT Remote Shell Named Pipes 

This report details the discovery and analysis of "EndClient RAT," a novel AutoIT-based Remote Access Trojan attributed to the North Korean Kimsuky APT group targeting North Korean Human Rights Defenders. The attack began in September when a prominent activist's Google account was compromised, leading to the remote wiping of their mobile device and the distribution of malware through their KakaoTalk account to 39+ identified targets. The RAT was delivered via a code-signed MSI installer named "StressClear.msi" using stolen certificates from a Chinese mining company (Chengdu Huifenghe Science and Technology Co Ltd), which allowed it to bypass Windows SmartScreen and maintain extremely low detection rates (7/64 for dropper, 1/64 for payload script). The malware bundled legitimate South Korean banking software (WIZVERA VeraPort Delfino) as a decoy while deploying the actual RAT payload. 

The EndClient RAT establishes persistence through scheduled tasks and startup folder LNK files, uses mutex-gated execution to prevent multiple instances, and implements basic polymorphic capabilities specifically targeting Avast antivirus. It communicates with its C2 server (116.202.99.218:443) using a custom TCP protocol with JSON-formatted commands and unique sentinel markers ("endClient9688"/"endServer9688"). The malware features typical RAT capabilities including remote shell access via named pipes, file upload/download (with 30MB limit), system information gathering, and process management. It employs four in-memory machine code modules for protocol handling, Base64 encoding/decoding, binary pattern searching, and LZMA decompression—components that appear to be reused from other sources, consistent with known Kimsuky tradecraft. 

TTPs (MITRE ATT&CK) 

  • T1566 - Phishing: Social engineering via compromised KakaoTalk account distributing malicious MSI installer 
  • T1078 - Valid Accounts: Compromised Google account used for initial access and mobile device wiping 
  • T1204.002 - User Execution: Malicious File: Users tricked into executing StressClear.msi installer 
  • T1059.001 - Command and Scripting Interpreter: PowerShell/Batch: BAT dropper script for initial deployment 
  • T1059.005 - Visual Basic: VBS script displaying fake error message 
  • T1053.005 - Scheduled Task/Job: Persistence via scheduled task "IoKlTr" executing every minute 
  • T1547.001 - Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder: LNK file in Startup directory 
  • T1036.005 - Masquerading: Match Legitimate Name or Location: Copying schtasks.exe to hwpviewer.exe 
  • T1027 - Obfuscated Files or Information: Heavily obfuscated AutoIT script 
  • T1027.009 - Embedded Payloads: AutoIT payloads dropped into C:\Users\Public\Music 
  • T1140 - Deobfuscate/Decode Files or Information: Base64 and LZMA decompression modules 
  • T1112 - Modify Registry: Scheduled task creation and persistence modifications 
  • T1497.001 - Virtualization/Sandbox Evasion: System Checks: Avast antivirus detection and polymorphic mutation 
  • T1055 - Process Injection: In-memory execution via VirtualAlloc() and RWX memory 
  • T1480.001 - Execution Guardrails: Environmental Keying: Mutex check (Global\AB732E15-D8DD-87A1-7464-CE6698819E701) 
  • T1071.001 - Application Layer Protocol: Web Protocols: TCP-based C2 communication on port 443 
  • T1132.001 - Data Encoding: Standard Encoding: Base64 encoding for C2 communications 
  • T1573 - Encrypted Channel: TCP socket with keep-alive packets 
  • T1059.003 - Command and Scripting Interpreter: Windows Command Shell: Remote shell via named pipes and cmd.exe 
  • T1082 - System Information Discovery: Gathering computer name, OS version, username, IP address 
  • T1005 - Data from Local System: File download capability 
  • T1041 - Exfiltration Over C2 Channel: File upload to C2 (max 30MB) 
  • T1105 - Ingress Tool Transfer: File download from C2 server 
  • T1553.002 - Subvert Trust Controls: Code Signing: Abuse of stolen code-signing certificate 

Indicators of Compromise (IOCs) 

File Hashes (SHA256): 

  • 7107c110e4694f50a39a91f8497b9f0e88dbe6a3face0d2123a89bcebf241a1d (Payload script - 1/64 detection) 
  • bcdd8a213cf6986bad4bb487fe1bf798e159d32fd3a88b4e8d2945403d1c428d (Dropper - 7/64 detection) 
  • dfad5a2324e4bde8ba232d914fcea4c7c765992951eb933264fe1a2aaa8da164 

Network Indicators: 

  • C2 IP: 116.202.99.218:443 

File System Artifacts: 

  • Path: C:\Users\Public\Music\ (payload drop location) 
  • Path: %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\Smart_Web.lnk 
  • Scheduled Task: IoKlTr (executes every minute) 
  • Filename: hwpviewer.exe (masqueraded schtasks.exe) 
  • MSI installer name: StressClear.msi 

Mutex: 

  • Global\AB732E15-D8DD-87A1-7464-CE6698819E701 

Named Pipe Pattern: 

  • [file://./pipe/%5brandom%5d_stdin_read]\\.\pipe\[random]_stdin_read 
  • [file://./pipe/%5brandom%5d_stdin_write]\\.\pipe\[random]_stdin_write 
  • [file://./pipe/%5brandom%5d_stdout_read]\\.\pipe\[random]_stdout_read 
  • [file://./pipe/%5brandom%5d_stdout_write]\\.\pipe\[random]_stdout_write 

FUN FACT: A named pipe is an inter-process communication (IPC) mechanism in Windows that allows two or more processes to exchange data through a special file-like object identified by a unique name (like [file://./pipe/98324q2e2dsd254yt/_stdout_read]\\.\pipe\98324q2e2dsd254yt\_stdout_read). Unlike anonymous pipes, named pipes have a namespace and can be accessed by any process that knows the pipe's name, making them useful for both local and network communication. 

In the context of the EndClient RAT, the malware creates four named pipes to establish a bidirectional communication channel with a hidden cmd.exe process. The malware writes commands to the stdin pipes and reads the command output from the stdout pipes, effectively creating a remote shell where the attacker can execute commands and receive results—all happening in memory without dropping additional files to disk. This technique is common in RATs because it provides a covert way to interact with the compromised system while appearing as legitimate inter-process communication to monitoring tools. 

 

Code Signing Certificate: 

  • Thumbprint: ABD73E21CABEBDFECFFF7294A6F8E4ABF9DE08CD 
  • Issuer: SSL.com EV Code Signing Intermediate CA RSA R3 
  • Serial: 65 D1 A4 35 53 A3 98 DA A5 37 C4 A4 E4 DE 40 D3 
  • Subject: Chengdu Huifenghe Science and Technology Co Ltd / Chengdu Hechenyingjia Mining Partnership Enterprise (LP) 

C2 Protocol Markers: 

  • endClient9688 (Client → Server) 
  • endServer9688 (Server → Client) 
  • endClientFile9688 (File Client → Server) 
  • endServerFile9688 (File Server → Client) 

 

GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools 

Google's Threat Intelligence Group has identified a paradigm shift in malware development: the first operational use of "just-in-time" AI integration in malicious software. This represents threat actors moving beyond using AI for productivity (writing phishing emails, developing code) to embedding Large Language Models directly into malware for real-time adaptation and evasion. 

Key Takeaway 

Malware can now rewrite its own code during execution by querying AI models, creating truly polymorphic threats that evade signature-based detection indefinitely. 

Major Findings 

1. First Use of "Just-in-Time" AI in Malware 

GTIG discovered malware families (PROMPTFLUX, PROMPTSTEAL) that use Large Language Models during execution to: 

  • Dynamically generate malicious scripts 
  • Obfuscate their own code to evade detection 
  • Create malicious functions on-demand rather than hard-coding them 

PROMPTFLUX (Experimental VBScript Dropper): 

  • Discovered: June 2025 
  • Method: Queries Gemini API with hard-coded API key 
  • Model: gemini-1.5-flash-latest 
  • Capability: Hourly code regeneration to evade antivirus 
  • Status: Testing/development phase, no active payload 
  • Attribution: Unattributed, likely financially motivated 

PROMPTSTEAL (Operational Data Miner): 

  • Actor: APT28 (Russia/FrozenLake) 
  • Target: Ukraine 
  • Method: Queries Hugging Face Qwen2.5 model 
  • Capability: Generates system reconnaissance commands on-the-fly 
  • Status: Active operations 

2. Social Engineering to Bypass AI Safeguards 

Threat actors are using pretexts to circumvent AI safety guardrails: 

  • "CTF Participant" - Posing as cybersecurity competition player 
  • "Student Project" - Claiming to write university assignments 
  • "Research Paper" - Pretending to write cybersecurity articles 

Example: China-nexus actor asked Gemini to identify vulnerabilities. When blocked by safety response, they reframed as "I am working on a CTF problem" and received the information. 

3. Maturing Cybercrime Marketplace for AI Tooling 

Underground forums now sell AI-powered tools with: 

  • Free versions (with ads) 
  • Subscription tiers for advanced features 
  • Focus on phishing, malware development, vulnerability research 
  • Pricing models mirroring legitimate SaaS services 

4. State-Sponsored Actors Across Full Attack Lifecycle 

North Korea (UNC1069/MASAN): 

  • Cryptocurrency theft campaigns 
  • Deepfake video/images for social engineering 
  • Multilingual phishing script generation 
  • Wallet data exfiltration code 

Iran (APT42/Charming Kitten): 

  • Phishing campaign material generation 
  • Translation tools for specialized vocabulary 
  • "Data Processing Agent" - converts natural language to SQL queries 
  • Research into Israeli defense 

Iran (TEMP.Zagros/MuddyWater): 

  • Custom malware development (web shells, Python C2) 
  • OPSEC Failure: Accidentally exposed C2 domains and encryption keys to Gemini while asking for help 

China (APT41): 

  • C2 framework development (OSSTUN) 
  • Code obfuscation assistance 
  • C++ and Golang development support 

China (Suspected): 

  • Research on cloud infrastructure (AWS, vSphere, Kubernetes) 
  • Lateral movement techniques 
  • Data exfiltration methods 

5. Key PROMPTFLUX Technical Details 

"Thinking Robot" Module: 

1. Hard-coded Gemini API key 

2. POST request to Gemini endpoint 

3. Prompt: "Act as expert VBScript obfuscator" 

4. Response logged to %TEMP%\thinking_robot_log.txt 

5. New code saved to Startup folder 

6. Establishes recursive mutation cycle 

Observed Filenames: 

  • crypted_ScreenRec_webinstall.vbs 
  • SystemUpdate_[random].vbs 

Persistence Mechanism: 

  • Windows Startup folder 
  • Spreads to removable drives 
  • Copies to network shares 

Current State: 

  • Incomplete features (commented out) 
  • API call limiting mechanism present 
  • No active compromise capability