Skip to content

Hide Navigation Hide TOC

KONNI (24ee55e3-697f-482f-8fa8-d05999df40cd)

Talos has discovered an unknown Remote Administration Tool that we believe has been in use for over 3 years. During this time it has managed to avoid scrutiny by the security community. The current version of the malware allows the operator to steal files, keystrokes, perform screenshots, and execute arbitrary code on the infected host. Talos has named this malware KONNI. Throughout the multiple campaigns observed over the last 3 years, the actor has used an email attachment as the initial infection vector. They then use additional social engineering to prompt the target to open a .scr file, display a decoy document to the users, and finally execute the malware on the victim's machine. The malware infrastructure of the analysed samples was hosted by a free web hosting provider: 000webhost. The malware has evolved over time. In this article, we will analyse this evolution:

Cluster A Galaxy A Cluster B Galaxy B Level
Konni (f982fa2d-f78f-4fe1-a86d-d10471a3ebcf) Malpedia KONNI (24ee55e3-697f-482f-8fa8-d05999df40cd) Tool 1
Konni (5b930a23-7d88-481f-8791-abc7b3dd93d2) RAT KONNI (24ee55e3-697f-482f-8fa8-d05999df40cd) Tool 1
Konni (f982fa2d-f78f-4fe1-a86d-d10471a3ebcf) Malpedia Konni (5b930a23-7d88-481f-8791-abc7b3dd93d2) RAT 2