File:: Iblis.zip ...
: Run the file only in an isolated VM for analysis.
Exfiltrating system metadata (IP, OS version, hardware info). Taking screenshots of the victim's desktop. File: iBLiS.zip ...
: Attempts to connect to Command & Control (C2) servers via non-standard ports. : Run the file only in an isolated VM for analysis
The "iBLiS" package (often spelled , meaning "devil" in Arabic/Indonesian) is a malicious toolset designed to compromise Windows systems. It is typically distributed through phishing or social engineering campaigns. 🔍 Technical Characteristics Malware Category : InfoStealer / Remote Access Trojan (RAT). Primary Functions : Stealing browser-stored credentials and cookies. Capturing keystrokes (keylogging). : Attempts to connect to Command & Control
: Ensure Windows Defender or your EDR is active to block known signatures of this variant.
If you encounter this file, look for these common behaviors:
Draft a (YARA or Sigma) to find it on your network. Explain the de-obfuscation steps for the scripts inside.