← Back to Pulse Feed
PULSE DETAIL
PULSE NAME
Live C2 Dump Recovering Every Stage of the Kill Chain: CHM Dropper, VBScript Stager, PowerShell Keylogger
On April 11, 2026, researchers analyzed a CHM file (api_reference.chm) tagged as Kimsuky that initiated a three-stage attack chain. The C2 server at check[.]nid-log[.]com had directory listing enabled, allowing recovery of complete source code for all payload stages: a 6,338-byte VBScript performing system reconnaissance and establishing persistence via scheduled task, a 449-byte VBScript bridge to PowerShell, and a 6,234-byte PowerShell keylogger with clipboard monitoring and timed exfiltration. The infrastructure included 79+ domains across 5 C2 IPs spanning Korean VPS providers. The server responded with "Million OK !!!!" signature, matching previously documented Kimsuky infrastructure while showing upgraded Apache/PHP stack. The operation targeted Korean Naver users through credential phishing and tax authority impersonation, with infrastructure linked to previously documented Kimsuky campaigns via shared DAOU Technology subnets.
MITRE ATT&CK & Malware Families
Indicators of Compromise (5 / 47 total)
| TYPE | INDICATOR | DESCRIPTION | CREATED | |
|---|---|---|---|---|
| FileHash-MD5 | 08815400eb034d0c760d031e735bd392 | — | 2026-04-13 | |
| FileHash-MD5 | 0ac44ad9cfbc58ed76415f7bc79239f9 | — | 2026-04-13 | |
| FileHash-MD5 | 4599ac1bbe483c73064df1353feafd01 | — | 2026-04-13 | |
| FileHash-MD5 | 6d03fd0b89fe997408b9e9e3d5ead602 | — | 2026-04-13 | |
| FileHash-MD5 | 6f90f6b96fe3a5b79c1935211f557a08 | — | 2026-04-13 |