← Back to Pulse Feed
PULSE DETAIL
PULSE NAME
Live C2 Dump Recovering Every Stage of the Kill Chain: CHM Dropper, VBScript Stager, PowerShell Keylogger
On April 11, 2026, researchers analyzed a CHM file (api_reference.chm) tagged as Kimsuky that initiated a three-stage attack chain. The C2 server at check[.]nid-log[.]com had directory listing enabled, allowing recovery of complete source code for all payload stages: a 6,338-byte VBScript performing system reconnaissance and establishing persistence via scheduled task, a 449-byte VBScript bridge to PowerShell, and a 6,234-byte PowerShell keylogger with clipboard monitoring and timed exfiltration. The infrastructure included 79+ domains across 5 C2 IPs spanning Korean VPS providers. The server responded with "Million OK !!!!" signature, matching previously documented Kimsuky infrastructure while showing upgraded Apache/PHP stack. The operation targeted Korean Naver users through credential phishing and tax authority impersonation, with infrastructure linked to previously documented Kimsuky campaigns via shared DAOU Technology subnets.
MITRE ATT&CK & Malware Families
Indicators of Compromise (6 / 47 total)
| TYPE | INDICATOR | DESCRIPTION | CREATED | |
|---|---|---|---|---|
| URL | http://check.nid-log.com/api' | — | 2026-04-13 | |
| URL | http://check.nid-log.com/api/bootservice.php | — | 2026-04-13 | |
| URL | http://check.nid-log.com/api/bootservice.php?tag= | — | 2026-04-13 | |
| URL | http://check.nid-log.com/api/checkservice.php | — | 2026-04-13 | |
| URL | http://check.nid-log.com/api/finalservice.php | — | 2026-04-13 | |
| URL | http://noreplymail.space/BitJoker/bootservice.php | — | 2026-04-13 |