PULSE NAME
Live C2 Dump Recovering Every Stage of the Kill Chain: CHM Dropper, VBScript Stager, PowerShell Keylogger
WHITE Kimsuky AlienVault 2026-04-13 Modified: 2026-04-13
47
IOCs
MEDIUM VOLUME
On April 11, 2026, researchers analyzed a CHM file (api_reference.chm) tagged as Kimsuky that initiated a three-stage attack chain. The C2 server at check[.]nid-log[.]com had directory listing enabled, allowing recovery of complete source code for all payload stages: a 6,338-byte VBScript performing system reconnaissance and establishing persistence via scheduled task, a 449-byte VBScript bridge to PowerShell, and a 6,234-byte PowerShell keylogger with clipboard monitoring and timed exfiltration. The infrastructure included 79+ domains across 5 C2 IPs spanning Korean VPS providers. The server responded with "Million OK !!!!" signature, matching previously documented Kimsuky infrastructure while showing upgraded Apache/PHP stack. The operation targeted Korean Naver users through credential phishing and tax authority impersonation, with infrastructure linked to previously documented Kimsuky campaigns via shared DAOU Technology subnets.
Indicators of Compromise (5 / 47 total)
All IPv4 FileHash-MD5 FileHash-SHA1 FileHash-SHA256 URL YARA domain hostname
TYPEINDICATORDESCRIPTIONCREATED
FileHash-MD5 08815400eb034d0c760d031e735bd392 2026-04-13
FileHash-MD5 0ac44ad9cfbc58ed76415f7bc79239f9 2026-04-13
FileHash-MD5 4599ac1bbe483c73064df1353feafd01 2026-04-13
FileHash-MD5 6d03fd0b89fe997408b9e9e3d5ead602 2026-04-13
FileHash-MD5 6f90f6b96fe3a5b79c1935211f557a08 2026-04-13