Exploring a New KimJongRAT Stealer Variant and Its PowerShell Implementation

unit42.paloaltonetworks.com · Dominik Reichel · 9 months ago · research
quality 7/10 · good
0 net
Exploring a New KimJongRAT Stealer Variant and Its PowerShell Implementation Threat Research Center Threat Research Malware Malware Exploring a New KimJongRAT Stealer Variant and Its PowerShell Implementation 25 min read Related Products Advanced DNS Security Advanced Threat Prevention Advanced URL Filtering Advanced WildFire Cloud-Delivered Security Services Cortex Cortex XDR Cortex XSIAM Unit 42 Incident Response By: Dominik Reichel Published: June 17, 2025 Categories: Cybercrime Malware Threat Research Tags: Backdoor Cryptocurrency Infostealer PowerShell Share Executive Summary This article provides a comprehensive analysis of two new variants of the KimJongRAT stealer. We combine our new research findings with existing knowledge to provide a comprehensive resource for understanding and combating these new KimJongRAT variants. The KimJongRAT stealer was first described in 2013 by the Malware.lu CERT [PDF] . We documented another variant of this family in 2019. One of the new variants uses a Portable Executable (PE) file and the other uses a PowerShell implementation. The PE and PowerShell variants are both initiated by clicking a Windows shortcut (LNK) file that downloads a dropper file from an attacker-controlled content delivery network (CDN) account. The PE variant’s dropper deploys a loader, a decoy PDF and a text file. The dropper in the PowerShell variant deploys a decoy PDF file along with a ZIP archive. The loader downloads more malicious files, including the stealer component for KimJongRAT. The PowerShell variant's dropper file deploys a decoy PDF file and a ZIP archive containing scripts that include the KimJongRAT PowerShell-based stealer and keylogger components. Both variants are designed to gather and transfer victim information and browser data, including from crypto-wallet extensions, to the attacker’s server. The PE variant also collects FTP and email client information. The infection sequence uses a multi-file approach and a legitimate CDN service to mask its malicious activities. Palo Alto Networks customers are better protected from the malware samples described in this article through Advanced WildFire , Advanced URL Filtering , Advanced DNS Security and Advanced Threat Prevention . Cortex XDR and XSIAM are designed to prevent the execution of known malicious malware, and also prevent the execution of unknown malware using Behavioral Threat Protection and machine learning based on the Local Analysis module. If you think you might have been compromised or have an urgent matter, contact the Unit 42 Incident Response team . Related Unit 42 Topics PowerShell , Backdoor New KimJongRAT PE Variant This section details the new KimJongRAT variant that uses PE files as final payloads. The initial file of the execution chain is an LNK file, but we do not yet know how attackers distribute these files. Figure 1 shows the execution flow of the most recent KimJongRAT variant. Figure 1. Malware execution chain of the latest KimJongRAT PE variant ( icon sources ). Step 1: When double-clicked, the initial LNK file downloads an HTML Application (HTA) file from an attacker-controlled CDN account, saves it to disk and runs it as shown in Figure 1 Step 2: The HTA file drops three embedded files sys.dll , sexoffender.pdf and user.txt to disk Sexoffender.pdf is a decoy PDF file opened by the victim's default PDF reader The HTA file executes the sys.dll loader Step 3: The loader uses two payload URL strings in the user.txt file to retrieve two more files named main64.log and net64.log These LOG files are a new KimJongRAT stealer component and an orchestrator Step 4: The orchestrator sends the collected information and data to a command and control (C2) server and awaits commands from the attackers To more fully understand these steps, let’s examine the associated files. PE Variant Initial LNK File When double-clicking one of the initial LNK files , the file uses the Windows tool cmd.exe to change the current directory to the Windows %temp% folder (shown in the Local base path and Command line arguments in Figure 2) . It then uses the Windows tool curl.exe to download an HTA file named pdf.hta from a legitimate CDN provider at cdn.glitch[.]global into the %temp% directory. The attacker abuses this service to host the next and subsequent stages of the malware. The URL for the HTA file contains a parameter v with the string 1740535190239 . This string is an epoch date that translates to Wednesday, February 26, 2025, 1:59 a.m. (GMT). Finally, the LNK runs the downloaded HTA file using the Windows tool mshta.exe as shown in Figure 2. Figure 2. Execution related LNK information as shown in LnkParse3 . This LNK file contains unique metadata that can be used to find additional samples. Figure 3 shows the drive serial number, Windows OS version and machine ID of the system where the LNK file was created. Additionally, there is a Korean language string 응용 프로그램 (translated: application program ) in the extra data section. Figure 3. Metadata from the LNK file as shown in LnkParse3 . PE Variant First Stage HTA File The LNK sample we analyzed downloaded and saved an HTA file named pdf.hta to the Windows %temp% directory. This HTA file contains obfuscated VBS code. Additionally, the HTA file has three embedded payloads appended after the code as Base64 text. Figure 4 shows an excerpt of the HTA file with the obfuscated VBS code and the start of the Base64-encoded payloads. Figure 4. Excerpt of the pdf.hta file content as shown in Visual Studio Code . Figure 5 shows the deobfuscated version of this HTA file with the truncated Base64-encoded payloads. Figure 5. Deobfuscated version of pdf.hta as shown in Visual Studio Code . The Base64 string for the first payload starting with JVBERi0xL is decoded through the Windows tool certutil.exe and dropped as the decoy PDF file sexoffender.pdf into the Windows %temp% directory. It is then opened by the default application for PDF files. The Base64 string starting with aHR0cHM6L for the second payload is decoded and dropped as user.txt to the %localappdata% folder. The third Base64 string starting with TVqQAAMAAA is decoded and dropped as sys.dll , also to the %localappdata% folder. This HTA file then runs sys.dll using rundll32.exe using sys.dll 's only exported function named s . The dropped user.txt is a text file containing URLs to the same CDN sub-directory that hosts the malicious HTA file, as shown in Figure 6. Figure 6. The content of user.txt as shown in Windows Notepad. The last dropped file is named sys.dll , and it downloads the files from the URLs in user.txt and executes them. Second Stage Loader sys.dll The second stage loader named sys.dll is a 64-bit DLL internally named baby.dll . It has a single exported function named s that contains all the malware's functionality. When this function is called with rundll32.exe , it first checks whether the malware is running on a virtual machine or sandbox as shown in Figure 7. If that is the case, the loader deletes itself and quits. If not, it creates a mutex named co_sys_co and starts a sub-thread. Figure 7. Decompiled source code of exported function s from sys.dll as shown in IDA Pro . The sub-thread checks if any previously dropped payloads are present in the %localappdata%\net directory. It uses this directory to store downloaded payloads from the attacker’s CDN stager URL. The sys.dll loader expects any files downloaded to this folder to be encrypted data binaries with the first 16 bytes being the RC4 decryption key for the remaining bytes. When it finds a file in this folder, it decrypts, executes and finally deletes the file. After creating the sub-thread, the malware reads the URLs from the %localappdata%\user.txt file previously dropped by the HTA file. It appends the date and time in epoch format as ?v= [epoch time] to each URL string. Afterwards, it contacts the CDN service to download the RC4-encrypted file net64.log into the %localappdata%\net folder to load it reflectively. This net64.log file is the new KimJongRAT stealer component. It endlessly runs a loop that only exits if the file %localappdata%\micro.log.zip is present. This file is created by net64.log and contains the victim’s stolen information and data. When micro.log.zip is detected, the sys.dll loader downloads the second RC4-encrypted file main64.log from the CDN server and stores it as notepad.log . As soon as notepad.log is written to %localappdata%\net , the sub-thread reads, decrypts, executes and deletes it. This decrypted file is the main orchestrator that implements network, backdoor and information-stealing functionality. Third Stage Orchestrator and Backdoor The downloaded payload main64.log is internally named NetworkService.dll and has a compilation timestamp of December 3, 2024, 7:36 a.m. UTC. Figure 8 shows its PDB file path . Figure 8. PDB file path of net64.log as shown in EXE Explorer . As noted in Figure 8, the software has a PDB file path that includes the string \research\Spyware\Advanced\Covaware . A 2019 article by ESTsecurity describes a campaign named Operation Giant Baby where attackers used malware with the same name in activity relating to our BabyShark article from the same year. This main64.log file is the main orchestrator that handles output created by the other downloaded file net64.log . While main64.log is primarily responsible for the network communication and backdoor functionality, net64.log is responsible for stealing credentials from browser and email or FTP clients. The main orchestrator has a single exported function named fool , which contains the majority of the malware’s functionality. The DllMain entry point is only used for various initialization routines. These routines create multiple directories associated with the base C2 URL and file paths that the malware uses later. As a unique victim ID, main64.log uses the volume serial number. If the volume serial number cannot be obtained, main64.log uses a combination of the computer and username for the victim ID. It encodes this alternative ID value as a Base64 string, as shown in Figure 9. Figure 9. Decompiled C2 base URL creation function from main64.log as shown in IDA Pro . However, this alternative ID is not used throughout the malware’s code and thus seems to be leftover code from earlier versions of this malware. After establishing the unique ID, main64.log calls the exported function fool before finally writing the clipboard data into a file. The exported function fool shown in Figure 10 starts four threads before infinitely looping through a sleep call. Figure 10. Decompiled C2 string creation function from main64.log as shown in IDA Pro . These threads are named as follows: main_thread clipboard_log_to_netkey_file keylogger_log_window_title_and_keys keylogger_flush_to_netkey_file The first thread named main_thread shown below in Figure 11 implements the network, backdoor and information stealing functionality. The other three threads are dedicated to recording keystrokes, window titles and clipboard information. Figure 11. Decompiled main_thread from main64.log as shown in IDA Pro . The network communication is implemented in an infinite loop that uploads collected data and requests commands from the C2 server. This malware implements three methods to communicate with the C2 server. To upload data or files, it uses the HTTP POST method with multipart/form-data , which we will subsequently describe as HTTP POST multi , or application/x-www-form-urlencoded , which we will call HTTP POST app . To download data, the malware uses an HTTP GET request. Figure 12 shows the initial network capture where the stolen browser data and the system information are sent to the C2 server. Figure 12. Initial network communication with the C2 server as shown in Wireshark . At first, the file micro.log.zip from the %localappdata% directory is copied into the %temp% directory as micro.log.zip_ . This file is then uploaded to the C2 server with an HTTP POST multi request and the hard-coded boundary string ----------sdfaffi3457839sfhjkaskl . Before it is uploaded as a value of the key file0 , the ZIP archive is XORed with the key 0xFE . Additionally, two keys val and id with the values delete and the volume serial number are sent to the C2 server. The former is most likely a note that the original file micro.log.zip is deleted after its copy gets uploaded, while the latter is used to associate the ZIP archive to a specific victim. The HTTP POST multi method is always used to send file data, as is the same schema described above: Key: val , value: delete Key: id , value: Key: file0 , value: (XOR key is always 0xFE) The HTTP POST app method is either used to send encrypted data or to send the server-side delete command (further described as HTTP POST app delete ). This delete command is used on the server side to clear out the appropriate command or feature queue. The schema is as follows for data: Key: id , value: Key: nm , value: Key: val , value: (XOR key is always 0xFE ) or delete Next, the malware sends an HTTP GET request to the C2 URL ending with the victim's unique directory, which it creates from the volume serial number and the filename history.log_ . If the file is not already on the C2 server, the malware performs the following activities: Collecting various system information Writing it into a file named history.log in the %appdata% directory Creating a copy of it in the %temp% directory named history.log Sending it to the C2 server using the HTTP POST multi method It collects the following system information in history.log : Hostname IP address Computer name Windows user account name Disk drive information (available drives, volume names, file system names, drive types) Operating system (version and product name) System type (32-bit or 64-bit) Internet Explorer version Start menu items CPU information The initial communication sends the victim's data to the C2 server, and any additional actions from the C2 server are based on that initial data. Table 1 shows other information that is periodically uploaded to the C2 server. Collected User Data Queried C2 URL HTTP Method (and feature) Created Local Files Comment Search for files and directories in all directories based on a list of hard-coded file extensions and wildcards Check file URL: //netlist.log_ Check file URL: GET Upload file: POST multi File with information: %localappdata%\netlist.log Copy of file with information: %temp%\netlist.log_ Search files with the extensions .hwp , .pdf , .doc , .docx , .xls , .xlsx , .zip , .rar .egg , .txt , .jpg , .png , .jpeg , .alz , .ldb, and files and directories with the wildcards *wallet* and UTC--* Upload keylogger and clipboard data Upload file data: Upload file data: POST app File with information: %localappdata%\netkey The uploaded data is XORed with 0xFE Table 1. List of collected user data that is periodically uploaded to the C2 server. To receive instructions from the C2 server, the malware periodically sends HTTP requests through hard-coded URLs. Afterward, it deletes all files and data that it downloaded from the C2 server. Table 2 shows the implemented commands together with their URLs, HTTP methods and involved local files: Command Description Queried C2 URL HTTP Methods Created Local Files Comments Upload a specific file to the C2 URL Get specified file: //out Upload file and delete queue: Get specified file: GET Upload file: POST multi Delete queue: POST app delete Copy of specified file: %temp%\ The specified file is RC4-encrypted, and the uploaded file is XORed with 0xFE Download a file into a specified directory Get file data and specified directory: //in Delete queue: Get file data and specified directory: GET Delete queue: POST app delete N/A The downloaded file is RC4-encrypted Download a file into the %localappdata%\net directory Get specified file URL: //cok Delete queue: Get specified file URL: GET Delete queue: POST app delete N/A The downloaded file is RC4-encrypted Download a file into %localappdata%\notepad.tmp Check file URL: //tmp64 Delete queue: Check file URL: GET Delete queue: POST app delete Downloaded file: %localappdata%\notepad.tmp - Run a command-line command Get cmd-line command: //cmd Delete queue: Get cmd-line command: GET Delete queue: POST app delete - The command is RC4-encrypted, with the first 16 bytes being the key for the remaining bytes Search for files and directories in a specified directory based on a list of hard-coded file extensions and wildcards. Write information to a file and upload it. Get specified directory: //dir Upload file and delete queue: Get specified directory: GET Upload file: POST multi Delete queue: POST app delete File with information: %localappdata%\list.log Copy of file with information: %localappdata%\list.log Search files with the extensions .hwp , .pdf , .doc , .docx , .xls , .xlsx , .zip , .rar , .egg , .txt , .jpg , .png , .jpeg , .alz , .ldb , and files and directories with the wildcards *wallet* and UTC--* Table 2. List of backdoor commands. Third Stage KimJongRAT Stealer The other downloaded file net64.log is the main KimJongRAT stealer component. The decrypted file is internally named dwm.dll and has a compilation timestamp of December 15, 2024, 4:03 a.m. UTC. It has three exported functions init_engine , main_engine and stop_engine . Only the first function contains all the functionality, while the latter two only redirect execution to the entry point DllMain , which is empty. When init_engine is executed, the malware first resolves a list of API functions using GetProcAddress() . All function strings are encoded by a simple substitution cipher where characters are changed to others according to a mapping table. The following Python script contains the reconstructed algorithm and can be used for decoding these strings: import argparse class KimJongRATTool: CHAR_MAPPING = { '!': '-', '#': ')', '$': ';', '%': '+', '&': '=', '(': ':', ')': '#', '*': '_', '+': '%', ',': '/', '-': '!', '.': '?', '/': ',', ':': '(', ';': '$', '<': ']', '=': '&', '>': '^', '?': '.', '@': '}', '[': '{', ']': '<', '^': '>', '_': '*', 'a': 'm', 'b': 'q', 'c': 'f', 'd': 'h', 'e': 'x', 'f': 'c', 'g': 'l', 'h': 'd', 'i': 'p', 'j': 's', 'k': 't', 'l': 'g', 'm': 'a', 'n': 'z', 'o': 'r', 'p': 'i', 'q': 'b', 'r': 'o', 's': 'j', 't': 'k', 'u': 'y', 'v': 'w', 'w': 'v', 'x': 'e', 'y': 'u', 'z': 'n', '{': '[', '}': '@' } @staticmethod def map_string(encoded_string: str) -> str: return ''.join(KimJongRATTool.CHAR_MAPPING.get(c.lower(), c).upper() if c.isupper() else KimJongRATTool.CHAR_MAPPING.get(c, c) for c in encoded_string) def decode_string(self, encoded_string: str) -> None: print(f'Decoded string: {self.map_string(encoded_string)}') def decode_strings(self, file_path: str) -> None: with open(file_path) as f: print('Decoded strings:') for line in f: print(self.map_string(line.strip())) def main(): parser = argparse.ArgumentParser() group = parser.add_mutually_exclusive_group(required=True) group.add_argument('-f', '--file_path', type=str, help='(Absolute) File path with encoded strings.') group.add_argument('-s', '--encoded_string', type=str, help='Encoded string.') args = parser.parse_args() kjrt = KimJongRATTool() if args.file_path: kjrt.decode_strings(args.file_path) else: kjrt.decode_string(args.encoded_string) if __name__ == '__main__': main() 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 import argparse class KimJongRATTool : CHAR_MAPPING = { '!' : '-' , '#' : ')' , '$' : ';' , '%' : '+' , '&' : '=' , '(' : ':' , ')' : '#' , '*' : '_' , '+' : '%' , ',' : '/' , '-' : '!' , '.' : '?' , '/' : ',' , ':' : '(' , ';' : '$' , '<' : ']' , '=' : '&' , '>' : '^' , '?' : '.' , '@' : '}' , '[' : '{' , ']' : '<' , '^' : '>' , '_' : '*' , 'a' : 'm' , 'b' : 'q' , 'c' : 'f' , 'd' : 'h' , 'e' : 'x' , 'f' : 'c' , 'g' : 'l' , 'h' : 'd' , 'i' : 'p' , 'j' : 's' , 'k' : 't' , 'l' : 'g' , 'm' : 'a' , 'n' : 'z' , 'o' : 'r' , 'p' : 'i' , 'q' : 'b' , 'r' : 'o' , 's' : 'j' , 't' : 'k' , 'u' : 'y' , 'v' : 'w' , 'w' : 'v' , 'x' : 'e' , 'y' : 'u' , 'z' : 'n' , '{' : '[' , '}' : '@' } @ staticmethod def map_string ( encoded_string : str ) - > str : return '' . join ( KimJongRATTool . CHAR_MAPPING . get ( c . lower ( ) , c ) . upper ( ) if c . isupper ( ) else KimJongRATTool . CHAR_MAPPING . get ( c , c ) for c in encoded_string ) def decode_string ( self , encoded_string : str ) - > None : print ( f 'Decoded string: {self.map_string(encoded_string)}' ) def decode_strings ( self , file_path : str ) - > None : with open ( file_path ) as f : print ( 'Decoded strings:' ) for line in f : print ( self . map_string ( line . strip ( ) ) ) def main ( ) : parser = argparse . ArgumentParser ( ) group = parser . add_mutually_exclusive_group ( required = True ) group . add_argument ( '-f' , '--file_path' , type = str , help = '(Absolute) File path with encoded strings.' ) group . add_argument ( '-s' , '--encoded_string' , type = str , help = 'Encoded string.' ) args = parser . parse_args ( ) kjrt = KimJongRATTool ( ) if args . file_path : kjrt . decode_strings ( args . file_path ) else : kjrt . decode_string ( args . encoded_string ) if __name__ == '__main__' : main ( ) The same cipher is used to encode other sensitive strings related to the stealer's functionality. Based on the list of decoded function strings, the stealer attempts to retrieve information from various popular browsers and FTP or email clients. Other sensitive strings related to the stealer functionality, like the browser extension ID, are encrypted by a simple XOR-based cipher. The malware stores the stolen data in plain text and SQLite files in a directory %temp%\ [RandomName] .tmp . An overview of the victim information is stored in the file %temp%\ [RandomName] \micro.log . This file contains the following information: Operating system information CPU information Process information Start menu programs Website/cookie/password information of supported browsers Configuration and password information of supported email clients Password information of supported FTP clients The malware also searches all supported browsers for multiple cryptocurrency wallet extensions shown in Table 3. Extension ID Extension Name nkbihfbeogaeaoehlefnkodbefgpgknn MetaMask egjidjbpglichdcondbcbdnbeeppgdph Trust Wallet ibnejdfjmmkpcnlpebklmnkoeoihofec TronLink aholpfdialjgjfhomihkjbmgjidlcdno Exodus Web3 Wallet fhbohimaelbohpjbbldcngcnapndodjp BEW lite mcohilncbfahbmgdjkbpemcciiolgcge OKX Wallet bfnaelmomeimhlpmgjnjophhpkkoljpa Phantom ejbalbakoplchlghecdalmeeeajnimhm MetaMask pbpjkcldjiffchgbbndmhojiacbgflha OKX Wallet bhhhlbepdkbapadjdnnojkbgioiodbic Solflare Wallet Table 3. Searched for browser extensions with their corresponding IDs. The extension IDs for each browser are stored in the file %temp%\ [RandomName] \ext.log . Additionally, the malware steals various SQLite database files for supported browsers found in each browser’s user data directory. For example, for Google Chrome, these files can be found in C:\Users\ [UserName] \AppData\Local\Google\Chrome\User Data\Default for the default user. These database files contain detailed information about the user from browser features including bookmarks, history, saved passwords and installed extensions. The malware searches for the following in the database files: Cookies Login data Web data These files are copied to the %temp%\ [RandomName] .tmp directory and renamed by prepending the profile user and a browser indicator. The last file created in this directory contains the master encryption key derived from a browser’s Local State file. This key is needed to decrypt sensitive browser data, such as stored passwords or cookies. Finally, these files are compressed using the PowerShell Compress-Archive command to %localappdata%\micro.log.zip . This file is then uploaded to the C2 server by the orchestrator. Previous KimJongRAT PE Variants We have also discovered other variants of this malware execution chain, dating back to at least August 2024. The first variants deployed 32-bit DLL files as the final stealer and orchestrator payloads, which is different from the latest variant that uses 64-bit DLL files. Also, the execution chain sometimes differs in the way that the second-stage loader drops the decoy PDF, or whether it uses the decoy PDF at all. Other differences are that the initial LNK file does not use cmd.exe and curl.exe but instead powershell.exe with the Invoke-WebRequest command to download the next stage HTA dropper. New KimJongRAT PowerShell Variant This section discusses the latest variant of KimJongRAT, which uses a PowerShell information and crypto-wallet stealer as its final payload. It is very similar to the PE variant in its functionality but focuses on only stealing system and browser data. This execution chain uses a variety of file types and is carried out in multiple stages. The initial file is an LNK file as seen in Figure 13, which illustrates the full execution chain. Figure 13. Malware execution chain of the latest PowerShell variant ( icon sources ). Step 1: When double-clicked, the LNK file downloads an HTA file from an attacker-controlled CDN account to disk and runs it, as shown above in Figure 13 Step 2: When executed, this HTA file drops an embedded decoy PDF and a ZIP archive to disk Step 3: The decoy file is opened by the default installed PDF reader, and then files from the ZIP archive are extracted and saved to disk Step 4: From those extracted files, a PowerShell file loads the stealer and keylogger and sets the runner VBS script for persistence Step 5: The stealer sends the collected information and data to the C2 server and awaits commands from the attackers PowerShell Variant Initial LNK File An example of an initial LNK file (SHA256 hash: a66c25b1f0dea6e06a4c9f8c5f6ebba0f6c21bd3b9cc326a56702db30418f189 ) submitted to VirusTotal is named 성범죄자 신상정보 고지.pdf.lnk (translated from Korean: “ Sex Offender Personal Information Notification ”). This sample is almost identical to the sample we reviewed in the PE malware chain. The only difference is that it downloads a different HTA file named sfmw.hta and uses a different value for the parameter v as shown in Figure 14. Figure 14. Execution related LNK data as shown in LnkParse3 . The LNK file’s metadata is identical to the one described in the latest PE malware execution chain. First Stage HTA File The downloaded sfmw.hta file is dropped into the Windows %temp% directory. This file contains VBScript code, obfuscated with the same algorithm as the one in the PE variant. Unlike the PE variant, sfmw.hta only has two embedded payloads. Figure 15 shows an excerpt of this HTA file with the obfuscated code and one of the two Base64-encoded payloads. Figure 15. Excerpt of the sfmw.hta file content as shown in Visual Studio Code . Figure 16 shows the deobfuscated version of the HTA file with the truncated Base64-encoded payloads. Figure 16. Deobfuscated version of sfmw.hta as shown in Visual Studio Code . Figure 16 shows that the script within the HTA file uses findstr.exe with the /b parameter to locate each Base64-encoded payload within the file text. Then, the script uses certutil.exe to decode the Base64 strings. At first, the embedded payload starting with the Base64-encoded data JVBERi0xLj is dropped as sexoffender.pdf (same filename as in the PE variant) into the Windows %temp% directory. This decoy PDF file is then opened by the default installed PDF reader and seems to be a Korean form related to sex offenders, as shown in Figure 17. Figure 17. PDF decoy document sexoffender.pdf as shown in Adobe PDF Reader . The second payload from the HTA file is a Base64-encoded string starting with UEsDBBQAAA . This string is decoded and dropped as a ZIP archive named pipe.zip to the %localappdata% folder. The files from this archive are extracted, and the PowerShell file named 1.ps1 is run. The other unpacked file named 1.log is passed as an argument to the PowerShell file. Figure 18 shows that the pipe.zip archive contains four files. Figure 18. Files contained in pipe.zip as shown in 7-Zip . Components of this malware were created in September 2024, as shown in the Modified , Created and Accessed dates of the files 1.ps1 and 1.vbs . The files 1.log and 2.log that contain the Base64-encoded PowerShell stealer were updated in March 2025. Table 4 shows the names and SHA256 hashes of these files. Filename Hash 1.log ab8862628584aa429fe7614d1c674bbdf324fa2668c4d3c94670cf6b6db597f6 1.ps1 97d1bd607b4dc00c356dd873cd4ac309e98f2bb17ae9a6791fc0a88bc056195a 1.vbs f73164bd4d2a475f79fb7d0806cfc3ddb510015f9161e7dce537d90956c11393 2.log 3589c871b56cf76ce28c6be914b206afe977ec13b0894f56e05c5772a3c7e495 Table 4. Files contained in pipe.zip . Second Stage PowerShell Stealer The PowerShell file 1.ps1 shown in Figure 18 is a simple loader that decodes and runs the Base64-encoded file 1.log that is passed as an argument. It executes the PowerShell code with the Invoke-Expression alias iex as shown in Figure 19. Figure 19. PowerShell code of 1.ps1 as shown in Visual Studio Code . The decoded script in 1.log is a PowerShell stealer with backdoor functionality. This malware can be logically divided into three parts: Header Malware functionality Main function logic The header defines several variables and performs a simple anti-VM check as shown in Figure 20. Figure 20. Variable definitions and anti-VM check of the PowerShell stealer as shown in Visual Studio Code . The header part creates a new directory in the Windows %temp% folder named after the system’s UUID retrieved from the WMI ComputerSystemProduct class , and it defines a few path variables and the C2 URL. Additionally, this part checks whether the victim host is a VMware virtual machine based on the UUID serial number value. If it is a VMware system, the malware deletes itself and then exits. However, this anti-VM check is flawed, as the retrieved UUID does not contain any VM-related strings in comparison to other fields of the same WMI class. The second part of the malware is its functionality. This part consists of multiple functions, shown in Figure 21. Figure 21. Folded functions of the PowerShell stealer as shown in Visual Studio Code . Table 5 shows an overview of these functions. Function Name Description UploadFile Uploads a file from a specified path to a provided URL, appending “ &ap=1 ” to the URL after the first of each chunk. It also has an optional tag string parameter, which is used to create a unique filename along with a random number. Unprotect-Data Takes a Base64-encoded encrypted string, decodes it and decrypts the resulting data using the current user's data protection scope. It then writes the decrypted data to a file at the specified path. GetExWFile Explained in more detail below. GetBrowserData Explained in more detail below. Init Collects comprehensive system information, including operating system, CPU, disk, volume, network adapter details, running processes and installed software. It then writes this information to a text file info.txt located at $tempPath\$id . DownloadFile Downloads a file from a specified URL and saves it to a specified file path. CreateFileList Described in more detail below. RegisterTask Described in more detail below. Send Compresses a specified directory into a ZIP archive, which it then renames to init.dat and constructs a URL by appending the BIOS ID to the C2 base URL. It then uploads the init.dat file to this URL and, if successful, deletes the contents of the specified directory and the init.dat file. Get-ShortcutTargetPath Retrieves the target path of a specified Windows shortcut by creating a COM object of WScript.Shell and using its CreateShortcut method. RecentFiles Retrieves the target paths of all recent files (shortcuts) in the user's Windows account and appends them to a text file recent.txt . Work Described in more detail below. Table 5. Overview of the PowerShell functions used in the stealer. The GetBrowserData function is designed to extract various types of data from multiple browsers, including Edge , Chrome , Naver Whale and Firefox . This function uses another function named GetExWFile to manage specific data associated with cryptocurrency wallet browser extensions. Figure 22 shows an excerpt of the GetBrowserData function. This excerpt indicates the malware is still in development with many lines of code commented out. Figure 22. GetBrowserData function as shown in Visual Studio Code . During the data extraction process, the GetBrowserData function uses three hash tables to map specific extension IDs to their corresponding names. Table 6 shows all hashes with their corresponding extensions. Extension ID Extension Name nkbihfbeogaeaoehlefnkodbefgpgknn MetaMask egjidjbpglichdcondbcbdnbeeppgdph Trust Wallet ibnejdfjmmkpcnlpebklmnkoeoihofec TronLink aholpfdialjgjfhomihkjbmgjidlcdno Exodus Web3 Wallet fhbohimaelbohpjbbldcngcnapndodjp BEW lite mcohilncbfahbmgdjkbpemcciiolgcge OKX Wallet bfnaelmomeimhlpmgjnjophhpkkoljpa Phantom ejbalbakoplchlghecdalmeeeajnimhm MetaMask pbpjkcldjiffchgbbndmhojiacbgflha OKX Wallet opfgelmcmbiajamepnmloijbpoleiama Rainbow phkbamefinggmakgklpkljjmgibohnba Pontem Crypto Wallet dmkamcknogkgcdfhhbddcghachkejeap Keplr nphplpgoakhhjchkkhmiggakijnkhfnd TON Wallet jbppfhkifinbpinekbahmdomhlaidhfm iWallet Pro aiifbnbfobpmeekipheeijimdpnlpgpp Station Wallet bhhhlbepdkbapadjdnnojkbgioiodbic Solflare Wallet jblndlipeogpafnldhgmapagcccfchpi Kaika Wallet fpkhgmpbidmiogeglndfbkegfdlnajnf Cosmostation Wallet onhogfjeacnfoofkfgppdlbmlmnplgbn SubWallet pdliaogehgdbhbnmkklieghmmjkpigpa Bybit Wallet acmacodkjbdgmoleebolmdjonilkdbch Rabby Wallet aflkmfhebedbjioipglgcbcmnbpgliof Backpack fnjhmkhhmkbjkkabndcnnogagogbneec Ronin Wallet ppbibelpcjmhbdihakflkdcoccbgbkpo UniSat Wallet anokgmphncpekkhclmingpimjmcooifb Compass Wallet dlcobpjiigpikoobohmabehhmhfoodbb Argent X Starknet Wallet efbglgofoippbgcjepnhiblaibcnclgk Martian Aptos & Sui Wallet ejjladinnckdgjemekebdpeokbikhfci Petra Aptos Wallet fcfcfllfndlomdhbehjjcoimbgofdncg Leap Cosmos Wallet jnlgamecbpmbajjfhmmmlhejkemejdma Braavos Starknet Wallet fijngjgcjhjmmpcmkeiomlglpeiijkld Talisman Wallet mkpegjkblkkefacfnmkajcjmabijhclg Magic Eden Wallet aeachknmefphepccionboohckonoeemg Coin98 Wallet idnnbdplmphpflfnlkomgpfbpcgelopg XVerse Wallet dmkamcknogkgcdfhhbddcghachkejeap Keplr nnpmfplkfogfpmcngplhnbdnnilmcdcg Uniswap bfnaelmomeimhlpmgjnjophhpkkoljpa Phantom opcgpfmipidbgpenhmajoajpbobppdil Sui Wallet hnfanknocfeofbddgcijnmhnfnkdnaad Coinbase Wallet kkpllkodjeloidieedojogacfhpaihoh Enkrypt Table 6. Searched for browser extensions with their corresponding IDs. The GetExWFile function retrieves files associated with these extensions, based on the specific handling procedures defined for each of the hash tables. The function begins by attempting to retrieve the encrypted master key from the local user's data for each browser. If the browser process is running, it halts the process to avoid file access conflicts. Then, it navigates through all user profiles for each browser within the User Data directory. For every user profile, it duplicates various data types, such as Login Data and Bookmarks , to a new location. For Edge, Chrome and Naver Whale, the GetExWFile function processes data related to browser extensions. It receives the browser's name, the profile path and the profile name as arguments. After it duplicates the necessary data, the function enumerates all extensions installed for the user profile and appends this list to a text file named extensions.txt . If the browser process was initially running, this function restarts the process once it has copied all the data. For Firefox, the function specifically copies certain files ( key4.db , key3.db , cookies.sqlite , logins.json ) associated with each user profile. The CreateFileList function scans all file system drives on the system, specifically targeting the Users directory on the C:\ drive. It searches for files with extensions shown in Table 7. Extensions File Association .doc , .docx , .xls , .xlsx Microsoft Office .hwp , .hwpx Hancom Office .txt , .csv , .pdf , .log Text related .jpg , .jpeg , .png Images .rar , .zip , .alz Archives .ldb Microsoft Access lock .eml Email Table 7. List of files with their extensions that the stealer is looking for. Additionally, the CreateFileList function searches for any files matching the name patterns of various cryptocurrency-related terms and names as shown in Figure 23. Figure 23. CreateFileList function as shown in Visual Studio Code . All matching files are then written into a text file named FileList.txt . The RegisterTask function shown in Figure 24 creates an entry in the Windows registry under HKCU\Software\Microsoft\Windows\CurrentVersion\Run key for persistence. For this, it creates an entry named WindowsSecurityCheck and uses the file path to 1.vbs previously dropped from the ZIP archive. Figure 24. RegisterTask function as shown in Visual Studio Code . A commented-out code line in 1.ps1 (see Figure 24, line 409) indicates it has run 1.log directly in the malware code at some point. This functionality has been outsourced to the external file 1.vbs , which contains VBScript code obfuscated by the same algorithm as for all other files. Figure 25 below shows its deobfuscated version. Figure 25. VBScript code of 1.vbs as shown in Visual Studio Code . The last function Work continuously interacts with the C2 server, cycling through a set of operations as shown in Figure 26. This function is similar to the procedure of the PE variant. It periodically uploads the collected data and provides the attacker with backdoor functionality. This includes uploading any additional files to the C2 server or downloading and running additional PowerShell payloads to the victim’s system. Figure 26. Excerpt of the Work function as shown in Visual Studio Code . The control flow is as follows: The function is initiated by pausing for 600 seconds. It then constructs a URL ?id= &ap=1 to upload a file named k.log to the C2 server. The keylogger module creates this file. After the upload, the function deletes the file k.log from the local machine. It downloads a string from a server URL ?id/rd and splits it into lines. For each line, which is a provided file path, it constructs a URL ?id= and uploads the file to the server. Afterwards, it sends a GET request to a URL ?id= &del=rd to delete the read string from the server. Next, it downloads a string from another server URL ?id/wr and splits it into lines. For each line, it extracts the filename, constructs a URL ?id= / and downloads this file from the server to the victim’s system. It then sends a GET request to a URL ?id= &del= to delete the file from the server. It downloads a string from a C2 server URL ?id/cm and executes the string as a command using Invoke-Expression . This string can be any PowerShell code but is likely used to run additional payloads dropped previously. After execution, it sends a GET request to a URL ?id= &del=cm to delete the string on the server. The function repeats this entire process indefinitely. During our analysis of this malware, we did not observe any data returned from the C2 server. The last of the three parts of the stealer’s code is the main function logic shown in Figure 27. Figure 27. Main function logic as shown in Visual Studio Code . First, this section creates the malware persistence in the registry and then collects system information and browser data. Next, it runs the file 2.log using the PowerShell loader script 1.ps1 before it finally sends all data to the C2 server and waits for the attacker’s commands. The file 2.log is a keylogger module that captures and records keystrokes, window titles and clipboard content as shown in Figure 28. This module writes the recorded data into a log file named k.log , which is uploaded to the C2 server in the Work function. Figure 28. Base64-decoded keylogger code of 2.log as shown in Visual Studio Code . Previous Version of KimJongRAT PowerShell Variant We’ve found a previous version of the PowerShell variant that only differs slightly from the most recent one. The main differences are in the PowerShell script in the stealer. The initial LNK file downloads an HTA file named prevenue.hta from an attacker-controlled cdn.glitch[.]global URL. The URL to the HTA file contains the value 1742020326408 for the parameter v . This value is the time in epoch format for Saturday, March 15, 2025, 6:32 a.m. (GMT). The LNK file’s metadata is identical to the one used in the most recent version. The downloaded HTA file named prevenue.hta is almost identical to the HTA file used in the most recent version. The only differences are the embedded decoy PDF file dropped as revenue.pdf and the embedded ZIP archive containing a previous version of the PowerShell stealer. The decoy PDF file shown in Figure 29 seems to be a tax revenue-related document of a person from the South Korean city of Sejong. Figure 29. PDF decoy document revenue.pdf as shown in Adobe PDF Reader . Figure 30 shows the contents of the ZIP archive again dropped as pipe.zip . Figure 30. Files contained in pipe.zip as shown in 7-Zip . The only files that differ are 1.log , which contains Base64-encoded text for the PowerShell stealer, and 2.log , which contains Base64-encoded text for the keylogger module. The PowerShell stealer is an older version that uses the system’s BIOS serial number instead of the UUID, among other minor differences. The keylogger module is also an older version that uses the BIOS serial number. Conclusion Since it first emerged in 2019, the KimJongRAT stealer has evolved, adapting to the changing cybersecurity landscape. Our previous article highlighted the older variants of this malicious tool, and this article delves deeper into its latest incarnations. One variant uses a PE file, and another is a PowerShell implementation. This adaptability not only showcases the persistent threat posed by such malware but also underscores its developers' commitment to updating and expanding its capabilities. This new analysis reveals the PowerShell variant's special focus on cryptocurrency, as it searches for an extensive list of browser wallet extensions. The continued development and deployment of KimJongRAT, featuring changing techniques such as using a legitimate CDN server to disguise its distribution, demonstrates a clear and ongoing threat. Our comprehensive examination of these new variants provides crucial insights into their operation, aiding in the ongoing efforts to detect, neutralize and mitigate their effects. Palo Alto Networks customers are better protected from the threats described in this article in the following ways: The Advanced WildFire machine-learning models and analysis techniques have been reviewed and updated in light of the IoCs shared in this research Advanced URL Filtering and Advanced DNS Security identify known URLs and domains associated with this activity as malicious Advanced Threat Prevention has an inbuilt machine learning-based detection that can detect exploits in real time. Cortex XDR and XSIAM are designed to prevent the execution of known malicious malware, and also prevent the execution of unknown malware using Behavioral Threat Protection and machine learning based on the Local Analysis module. If you think you may have been compromised or have an urgent matter, get in touch with the Unit 42 Incident Response team or call: North America: Toll Free: +1 (866) 486-4842 (866.4.UNIT42) UK: +44.20.3743.3660 Europe and Middle East: +31.20.299.3130 Asia: +65.6983.8730 Japan: +81.50.1790.0200 Australia: +61.2.4062.7950 India: 00080005045107 Palo Alto Networks has shared these findings with our fellow Cyber Threat Alliance (CTA) members. CTA members use this intelligence to rapidly deploy protections to their customers and to systematically disrupt malicious cyber actors. Learn more about the Cyber Threat Alliance . Indicators of Compromise SHA256 Hashes of Initial LNK Files a66c25b1f0dea6e06a4c9f8c5f6ebba0f6c21bd3b9cc326a56702db30418f189 28f2fcece68822c38e72310c911ef007f8bd8fd711f2080844f666b7f371e9e1 3b0a3bd5b790e5f130e7819550613b7e0194a3475f553285a1b7dc18ecca9d02 8a000aa43c17250dd02f842bc2ab37e47dd8d68da0d59753943df8b37004b701 b90b2d992b41d146e70b775e2bc0430b9f7fb0ed0cd285c59daea92c2fc6af0b d92b858d691c84b4e3752fdd46b5673fbd6b5af101a7111c1d8756c90271b732 be080777332ad1186fb8547a6a354b2beba62f2a24537eb7b79e849f084a95be SHA256 Hashes of First Stage HTA Files 02783530bbd8416ebc82ab1eb5bbe81d5d87731d24c6ff6a8e12139a5fe33cee 3c2ea04090ad8c28116c42a9a2be5b240f135ac184e5a2c121b4eb311a7bf075 9c9136fc8a279ce395997dd42c075e265c6daec14b13bbe4237a4178769d270e 9bfbf7618a2c5270d552f4deb69b56082cc7723433a1517678863363cb800161 6347d70b73e1cabadf8af8602b22a8220ed5b7298dbc15f16eb7dd493d6c6a78 b7dad38a099947612fcc42c50f4ba1708af969a3222b3345bdff35323a41974d bcdc99e0f17486aa5a5faa0b9e7d7ccbeaa5372626733433214bb722ba260234 45980cc8afb4e1b3738130d0855bb608530eef6731c5116fd053ac6e04159725 7a37e2d6dc941386d1f300bac48056030f37c950bcd441d83eca708d2beab939 SHA256 Hashes of Second Stage Loader Files (baby.dll) f4d9547269e0cd7a0df97e394f688e0eb00b31965abd5e6ad67d373a7dc58f3b 7a9f4ca13aed4d6d8ba430bc2b2f5ac2e4f9c7b5de2f5d2ba5aada211059da73 d7a61ab1b1eadd3b34386ec2a96324195ec25cd71fe4e5d9a8f993a6bd52eb92 945e4f78196ef3a5548996a8d09e4220b779a2e78d40a86d64f233f7908550e6 5a18a29791cfb18767a43bebb61f923e64be7988235213678514007174f60b3e 4b87b775cdb265ecd872a71be810d7816d0d8b54663b3c536862db098874f288 8b0b62a31b348c5a2337ee69cfd3f68a427466539484f55f1cd2910237b59700 9e4e45e8f12db94997767bd3899968b9bc147bf08c062d3caea7f0864a67ea2c SHA256 Hashes of KimJongRAT Orchestrator Files (NetworkService.dll) 85be5cc01f0e0127a26dceba76571a94335d00d490e5391ccef72e115c3301b3 bdb272189a7cdcf166fce130d58b794b242c582032f19369166b3d4cfdc0902c 2ba3397cba28af1a929403910035b78bf946acbafe9e186ac329b55086fe7703 accf50d769408253bf9a7da378228debce7c8f6d60fb76da48196fe42cacedf3 SHA256 Hashes of KimJongRAT Stealer Files (dwm.dll, UPX packed) 96df4f9cb5d9cacd6e3b947c61af9b8317194b1285936ce103f155e082290381 c356cd9fea07353a0ee4dfd4652bf79111b70790e7ed63df6b31d7ec2f5953d5 5097553dff2a2da4f16b80a346fe543422b22d262e0c40e187b345afbcc7d41a ef0ce406fa722d30bfa094c660e81ed4a72ff8c75a629081293f4a86e0e587c2 SHA256 Hash of PowerShell Loader File 97d1bd607b4dc00c356dd873cd4ac309e98f2bb17ae9a6791fc0a88bc056195a SHA256 Hashes of PowerShell Stealer Files b103190c647ddd7d16766ee5af19e265f0e15d57e91a07b2a866f5b18178581c eb68ed54e543c18070e5cc93a27db4a508d79016c09e28a47260ca080110328f SHA256 Hashes of PowerShell Keylogger Files 3c6476411d214d40d0cc43241f63e933f5a77991939de158df40d84d04b7aa78 4e45009f5b582ca404b197d28805e363a537856b55e39c5c806fcf05acd928ff SHA256 Hash of Persistence VBS File f73164bd4d2a475f79fb7d0806cfc3ddb510015f9161e7dce537d90956c11393 CDN Stager (Base) URLs cdn.glitch[.]global/2eefa6a0-44ff-4979-9a9c-689be652996d/ cdn.glitch[.]global/17443dac-272c-421c-80ac-53a3695ede0e/ cdn.glitch[.]global/c97fe797-45c1-473b-a2f8-3c0c8bb431af/ cdn.glitch[.]global/59e3786e-8284-4f16-8844-134b12e58b6f/ cdn.glitch[.]global/4ab4f138-6f66-4b39-a7dc-9d4843dcf34f/ C2 (Base) URLs 131.153.13[.]235/sp/ 131.153.13[.]235/service/ secservice.ddns[.]net/service2/ srvdown.ddns[.]net/service3/ Additional Resources New BabyShark Malware Targets U.S. National Security Think Tanks - Palo Alto Networks Unit 42 BabyShark Malware Part Two – Attacks Continue Using KimJongRAT and PCRat - Palo Alto Networks Unit 42 KimJongRAT/stealer malware analysis [PDF] - Malware.lu CERT Special mission 'Operation Giant Baby', approaching as a huge threat - ESTsecurity Updated 16 June, 2025 at 3:26 PM PDT --> Back to top Tags Backdoor Cryptocurrency Infostealer PowerShell Threat Research Center Next: Serverless Tokens in the Cloud: Exploitation and Detections Table of Contents Related Articles Understanding Current Threats to Kubernetes Environments Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure Analyzing the Current State of AI Use in Malware Related Resources Threat Research April 8, 2026 Cracks in the Bedrock: Agent God Mode Agentcore AI agents AWS Read now Threat Research April 7, 2026 Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox Agentcore Agentcore runtime AWS Read now Threat Research April 6, 2026 Understanding Current Threats to Kubernetes Environments Audit logs Cloud Containers Read now Threat Research April 3, 2026 When an Attacker Meets a Group of Agents: Navigating Amazon Bedrock's Multi-Agent Applications AI Amazon Bedrock Read now High Profile Threats April 1, 2026 Threat Brief: Widespread Impact of the Axios Supply Chain Attack API attacks JavaScript Supply chain Read now High Profile Threats March 31, 2026 Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure CVE-2025-55182 GitHub Infostealer Read now Threat Research March 31, 2026 Double Agents: Exposing Security Blind Spots in GCP Vertex AI Agentic AI Data exfiltration GCP Read now High Profile Threats March 26, 2026 Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran (Updated March 26) APK DDoS attacks GenAI Read now Threat Actor Groups March 26, 2026 Converging Interests: Analysis of Threat Clusters Targeting a Southeast Asian Government CL-STA-1048 CL-STA-1049 Stately Taurus Read now Threat Research March 24, 2026 Threat Brief: Recruiting Scheme Impersonating Palo Alto Networks Talent Acquisition Team Email scam Lure Phishing Read now Get updates from Unit 42 Peace of mind comes from staying ahead of threats. Subscribe today. Your Email Subscribe for email updates to all Unit 42 threat research. By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. --> Invalid captcha! Subscribe Get the latest news, invites to events, and threat alerts Enter your email now to subscribe! Sign up By submitting this form, I understand my personal data will be processed in accordance with Palo Alto Networks Privacy Statement and Terms of Use. Sign up Products and Services AI-Powered Network Security Platform Secure AI by Design Prisma AIRS AI Access Security Cloud Delivered Security Services Advanced Threat Prevention Advanced URL Filtering Advanced WildFire Advanced DNS Security Enterprise Data Loss Prevention Enterprise IoT Security Medical IoT Security Industrial OT Security SaaS Security Next-Generation Firewalls Hardware Firewalls Software Firewalls Strata Cloud Manager SD-WAN for NGFW PAN-OS Panorama Secure Access Service Edge Prisma SASE Application Acceleration Autonomous Digital Experience Management Enterprise DLP Prisma Access Prisma Browser Prisma SD-WAN Remote Browser Isolation SaaS Security AI-Driven Security Operations Platform Cloud Security Cortex Cloud Application Security Cloud Posture Security Cloud Runtime Security Prisma Cloud AI-Driven SOC Cortex XSIAM Cortex XDR Cortex XSOAR Cortex Xpanse Unit 42 Managed Detection & Response Managed XSIAM Threat Intel and Incident Response Services Proactive Assessments Incident Response Transform Your Security Strategy Discover Threat Intelligence Company About Us Careers Contact Us Corporate Responsibility Customers Investor Relations Location Newsroom Popular Links Blog Communities Content Library Cyberpedia Event Center Manage Email Preferences Products A-Z Product Certifications Report a Vulnerability Sitemap Tech Docs Unit 42 Do Not Sell or Share My Personal Information Your browser does not support the video tag. Default Heading Read the article Seekbar Volume