PULSE NAME
Live C2 Dump Recovering Every Stage of the Kill Chain: CHM Dropper, VBScript Stager, PowerShell Keylogger
WHITE Kimsuky AlienVault 2026-04-13 Modified: 2026-04-13
47
IOCs
MEDIUM VOLUME
On April 11, 2026, researchers analyzed a CHM file (api_reference.chm) tagged as Kimsuky that initiated a three-stage attack chain. The C2 server at check[.]nid-log[.]com had directory listing enabled, allowing recovery of complete source code for all payload stages: a 6,338-byte VBScript performing system reconnaissance and establishing persistence via scheduled task, a 449-byte VBScript bridge to PowerShell, and a 6,234-byte PowerShell keylogger with clipboard monitoring and timed exfiltration. The infrastructure included 79+ domains across 5 C2 IPs spanning Korean VPS providers. The server responded with "Million OK !!!!" signature, matching previously documented Kimsuky infrastructure while showing upgraded Apache/PHP stack. The operation targeted Korean Naver users through credential phishing and tax authority impersonation, with infrastructure linked to previously documented Kimsuky campaigns via shared DAOU Technology subnets.
Indicators of Compromise (6 / 47 total)
All IPv4 FileHash-MD5 FileHash-SHA1 FileHash-SHA256 URL YARA domain hostname
TYPEINDICATORDESCRIPTIONCREATED
URL http://check.nid-log.com/api' 2026-04-13
URL http://check.nid-log.com/api/bootservice.php 2026-04-13
URL http://check.nid-log.com/api/bootservice.php?tag= 2026-04-13
URL http://check.nid-log.com/api/checkservice.php 2026-04-13
URL http://check.nid-log.com/api/finalservice.php 2026-04-13
URL http://noreplymail.space/BitJoker/bootservice.php 2026-04-13