MalwareBazaar Database

This page shows some basic information the YARA rule Detect_Kimsuky_APT_Malware including corresponding malware samples.

Database Entry


YARA Rule:Detect_Kimsuky_APT_Malware
Author:daniyyell
Description:Detects Kimsuky APT malware delivery technique using a malicious MMC console file
Firstseen:2024-09-05 14:36:19 UTC
Lastseen:2025-12-12 05:06:26 UTC
Sightings:71

Malware Samples


The table below shows all malware samples that matching this particular YARA rule (max 1000).

Firstseen (UTC)SHA256 hashTagsSignatureReporter