Through its US-CERT division, the U.S. Department of Homeland Security yesterday issued a new analysis report on a remote access trojan called KEYMARBLE that the agency says has been attributed to Hidden Cobra, a suspected North Korean APT actor.

The 32-bit Windows executable file, when executed, "de-obfuscates its application programming interfaces (APIs) and, using port 443, attempts to connect" to a series of hard-coded IP addresses and then waits for additional instructions, the report states. KEYMARBLE's capabilities include accessing device configuration data, downloading additional files, executing commands, modifying the registry, capturing screen shots and exfiltrating data, the report continues.

The US-CERT adds that the RAT relies on a customized XOR cryptographic algorithm to secure data transfers and command-and-control sessions.