Ali Chisom

I'm always excited to take on new projects and collaborate with innovative minds.

Address

Lagos

Social Links

Cybersecurity

Malware Analysis Report: KTMBE25040170.exe / Count.exe Campaign

This campaign highlights the sophistication of modern phishing threats and underscores the importance of layered defense—user awareness, IOC detection, and behavioral analytics.

Malware Analysis Report: KTMBE25040170.exe / Count.exe Campaign

In June 2025, I investigated a deceptive phishing campaign that leveraged multi-layered evasion techniques to deliver a stealthy malware payload disguised as a financial invoice. This campaign demonstrates how a seemingly innocent attachment—invoice_10988.img—led to a .NET-based dropper (KTMBE25040170.exe) that deployed a secondary payload (Count.exe) with persistence via a startup VBS script.

Key Findings:

• Initial Vector: Malicious email with .xz archive and mounted .img file
• Payload Behavior:
Drops Count.exe in %TEMP%

Establishes persistence via Count.vbs in the Startup folder

Initiates encrypted outbound C2 traffic tomxcnss.dns04.com:7702
• Obfuscation: .NET Reactor packing, control flow obfuscation
• Persistence: Hidden VBS launcher, mimicking benign startup behavior
• IOC Summary: SHA256, IP, Domain, File Paths provided

 Recommendations:

• Block .xz and .img attachments via email filtering
• Prevent .vbs execution from startup folders
• Monitor .NET executables for suspicious behavior
• Block traffic to known C2 IPs and ports
• Train users to recognize invoice-themed phishing attacks

drop your comment let's discuss on the comment section 👇

Conclusion

This campaign highlights the sophistication of modern phishing threats and underscores the importance of layered defense—user awareness, IOC detection, and behavioral analytics. 📎 Full report includes screenshots, technical artifacts, and a custom YARA rule for detection. 🔗 Let’s stay sharp, share knowledge, and raise the bar in proactive cybersecurity defense.

Disaster Recovery, Cybersecurity, Malware Analyst
2 min read
Dec 25, 2024
By Ali Chisom
Share

Leave a comment

Your email address will not be published. Required fields are marked *

Related posts

Feb 26, 2026 • 2 min read
Phishing Campaign Alert – Targeting Business Emails
Feb 19, 2026 • 4 min read
The Brutal Truth About Real-World Hacking — Final/Part 3
Feb 19, 2026 • 3 min read
The Brutal Truth About Real-World Hacking — Part 2
Your experience on this site will be improved by allowing cookies. Cookie Policy