Persistent Threats from the Kimsuky Group Using RDP Wrapper
AhnLab SEcurity intelligence Center (ASEC) has previously analyzed cases of attacks by the Kimsuky group, which utilized the PebbleDash backdoor and their custom-made RDP Wrapper. The Kimsuky group has been continuously launching attacks of the same type, and this post will cover additional malware that have been identified.
1. Overview
Threat actors are distributing a shortcut file (*.LNK) containing a malicious command through spear-phishing attacks. The fact that the file names include names and company names suggests that the threat actors may be gathering information on specific targets.
The shortcut malware is disguised as a document file with an Office document icon such as PDF, Excel, or Word. When this file is executed, PowerShell or Mshta is run to download and execute additional payloads from external sources. The malware that is ultimately executed to control the infected system are PebbleDash and RDP Wrapper. The threat actor has recently created and distributed PebbleDash and RDP Wrapper, but there are no significant differences from previous attack cases.

Figure 1. A PowerShell process installing the PebbleDash dropper
For reference, RDP Wrapper is an open-source utility that supports the remote desktop feature. Since Windows operating systems do not support remote desktop in all versions, RDP Wrapper can be installed in such environments to activate remote desktop. The threat actor is using RDP Wrapper that they created themselves. It is suspected that they are creating Export functions in various ways to bypass file detection.

Figure 2. Export functions of the self-developed RDP Wrapper
Threat actors can control the infected system using PebbleDash and RDP Wrapper, but they also utilize a variety of other malware, such as Proxy, KeyLogger, and information-stealing malware. This post will cover the types identified since the last post.
2. Proxy
Even if the RDP service is activated and a user account is added, external access to the infected system is not possible if it is located in a private network. To address this issue, threat actors install proxy malware that serves as an intermediary between the infected system and an external network, allowing them to access the system via RDP.
In the previous attacks, three main types of proxy tools were used. The first type is characterized by creating a mutex named “MYLPROJECT” and was identified along with a launcher. The launcher reads a configuration file located in a hard-coded path such as “C:\Programdata\USOShared2\version.ini” and uses this information to execute the proxy tool located in a specific path. The second type of proxy tool is characterized by creating a mutex named “LPROXYMUTEX” and is otherwise the same as a typical proxy. The last type is a Go language-based revsocks tool that is publicly available on GitHub.
The recently identified proxy tools use the following mutexes and receive addresses as arguments to operate.

Figure 3. A proxy tool similar to the previous type
3. KeyLogger
The Kimsuky group uses a PowerShell script to perform keylogging and also installs keyloggers in executable file format. In previous cases, the group mainly stored user keystrokes in the “%LOCALAPPDATA%\CursorCach.tmp” and “%LOCALAPPDATA%\CursorCache.db” paths. However, the recently identified types are characterized by storing the data in the “C:\Programdata\joeLog.txt” and “C:\Programdata\jLog.txt” paths.

Figure 4. Keylogging file
4. Theft of Web Browser Information (forceCopy)
In the previous cases, Infostealer malware were used to steal user credentials stored in Chromium-based web browsers and Internet Explorer. Recently, additional cases of the same type of malware have been identified.
The Kimsuky group used a tool that extracts only the key value from the “Local State” file instead of directly stealing credentials stored in the web browser. This is presumed to be for bypassing security products, and the extracted key is used later in the process of stealing credentials stored in the web browser.
The recently discovered type is installed under the name “forceCopy” and is used to copy files. It receives the path of the file to be copied as the first argument and the path where the file will be saved as the second argument. A characteristic of this malware is that it uses the NTFS Parser library to read files instead of APIs like ReadFile().

Figure 5. NTFS Parser library included in the malware
All of the paths where the malware is installed are web browser installation paths. It is assumed that the threat actor is attempting to bypass restrictions in a specific environment and steal the configuration files of the web browsers where credentials are stored. This may also be to bypass security products, similar to past cases.
5. Loader, Injector
The difference from previous cases is the identification of Injector and Loader malware. While the malware that ultimately operates in the memory has not been identified, the Loader loads a file from the “%SystemDirectory%\wbemback.dat” path into the memory, and the Injector receives information such as the target process for injection as an argument to operate.
In addition to malware in the form of executable files, ReflectiveLoader has also been identified among PowerShell scripts. It is obfuscated, but it is an open-source PowerShell script called “Invoke-ReflectivePEInjection.ps1”. It is installed along with other PowerShell script malware in the “%ALLUSERSPROFILE%\USOShared\Prosd\” directory.

Figure 6. ReflectiveLoader PowerShell script
6. Conclusion
In 2024, the attack methods of the Kimsuky group changed. While the use of LNK malware in spear-phishing attacks during the initial breach remained the same, the group began to increasingly use tools such as RDP Wrapper and Proxy to remotely control the infected systems instead of installing backdoors.
The Kimsuky threat group is continuously launching spear phishing attacks against Korean users. They mainly distribute malware disguised as a document file attached to an email, and if a user executes this file, threat actors can take control of the system. Users must carefully check the sender of the email and refrain from opening files from unknown sources. Users should also apply the latest patches for programs such as their OS and web browsers, and update AhnLab V3 to the latest version so that malware infection can be prevented.
File Detection
Backdoor/Win.PebbleDash.C5719351 (2025.01.20.02)
Trojan/Win.Rdpwrap.C5704469 (2024.12.10.02)
Trojan/Win.Rdpwrap.C5708551 (2024.12.21.00)
Trojan/Win.Rdpwrap.C5710893 (2024.12.27.00)
Trojan/Win.Rdpwrap.C5716647 (2025.01.12.03)
Trojan/Win.Rdpwrap.C5719870 (2025.01.21.03)
Trojan/Win.Rdpwrap.C5720371 (2025.01.23.00)
Trojan/Win.KeyLogger.C5687683 (2024.10.27.03)
Trojan/Win.KeyLogger.C5705213 (2024.12.12.01)
Trojan/Win.KeyLogger.C5705571 (2024.12.13.00)
Trojan/Win.Injecter.C5705214 (2024.12.12.01)
Trojan/Win.UACMe.C5705215 (2024.12.12.01)
Trojan/Win.Loader.C5716648 (2025.01.12.03)
Infostealer/Win.Browser.R641029 (2024.03.23.00)
Malware/Gen.Generic.C2950389 (2019.01.22.01)
Trojan/Win.Agent.C5687684 (2024.10.27.03)
Trojan/PowerShell.Loader (2025.01.31.02)
Trojan/PowerShell.Launcher (2025.01.31.02)
Trojan/PowerShell.KeyLogger (2025.01.31.02)