{"id":2384,"date":"2026-04-09T10:04:09","date_gmt":"2026-04-09T10:04:09","guid":{"rendered":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/09\/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain\/"},"modified":"2026-04-09T10:04:09","modified_gmt":"2026-04-09T10:04:09","slug":"the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain","status":"publish","type":"post","link":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/09\/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain\/","title":{"rendered":"The long road to your crypto: ClipBanker and its marathon infection chain"},"content":{"rendered":"<div>\n<p><img width=\"990\" height=\"400\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/09085753\/SL-clipbanker-proxifier-featured-990x400.jpg\" class=\"attachment-securelist-huge-promo size-securelist-huge-promo wp-post-image\" alt=\"\" decoding=\"async\" loading=\"lazy\"><\/p>\n<p>At the start of the year, a certain Trojan caught our eye due to its incredibly long infection chain. In most cases, it kicks off with a web search for \u201cProxifier\u201d. Proxifiers are speciaized software designed to tunnel traffic for programs that do not natively support proxy servers. They are a go-to for making sure these apps are functional within secured development environments.<\/p>\n<p>By coincidence, Proxifier is also a name for a proprietary proxifier developed by VentoByte, which is distributed under a paid license.<\/p>\n<p>If you search for Proxifier (or a proxifier), one of the top results in popular search engines is a link to a GitHub repository. That\u2019s exactly where the source of the primary infection lives.<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205147\/clipbanker1.png\" class=\"magnificImage\"><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter size-full wp-image-119342\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205147\/clipbanker1.png\" alt=\"\" width=\"1148\" height=\"1503\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205147\/clipbanker1.png 1148w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205147\/clipbanker1-229x300.png 229w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205147\/clipbanker1-782x1024.png 782w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205147\/clipbanker1-768x1005.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205147\/clipbanker1-267x350.png 267w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205147\/clipbanker1-740x969.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205147\/clipbanker1-214x280.png 214w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205147\/clipbanker1-687x900.png 687w\" sizes=\"(max-width: 1148px) 100vw, 1148px\"><\/a><\/p>\n<p>The GitHub project itself contains the source code for a rudimentary proxy service. However, if you head over to the Releases section, you\u2019ll find an archive containing an executable file and a text document. That executable is actually a malicious wrapper bundled around the legitimate Proxifier installer, while the text file helpfully offers activation keys for the software.<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205410\/clipbanker2.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-119343\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205410\/clipbanker2.png\" alt=\"\" width=\"881\" height=\"193\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205410\/clipbanker2.png 881w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205410\/clipbanker2-300x66.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205410\/clipbanker2-768x168.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205410\/clipbanker2-740x162.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205410\/clipbanker2-800x175.png 800w\" sizes=\"auto, (max-width: 881px) 100vw, 881px\"><\/a><\/p>\n<p>Once launched, the Trojan\u2019s first order of business is to add an exception to Microsoft Defender for all files with a TMP extension, as well as for the directory where the executable is sitting. The way the Trojan pulls this off is actually pretty exotic.<\/p>\n<p>First, it creates a tiny stub file \u2013 only about 1.5 KB in size \u2013 in the temp directory under the name \u201cProxifier&lt;???&gt;.tmp\u201d and runs it. This stub doesn\u2019t actually do anything on its own; it serves as a donor process. Later, a .NET application named \u201capi_updater.exe\u201d is injected into it to handle the Microsoft Defender exclusions. To get this done, api_updater.exe decrypts and runs a PowerShell script using the PSObject class. PSObject lets the script run directly inside the current process without popping up a command console or launching the interpreter.<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205455\/clipbanker3.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-119344\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205455\/clipbanker3.png\" alt=\"\" width=\"570\" height=\"88\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205455\/clipbanker3.png 570w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205455\/clipbanker3-300x46.png 300w\" sizes=\"auto, (max-width: 570px) 100vw, 570px\"><\/a><\/p>\n<p>As soon as the required exclusions are set, the trojanized proxifier.exe extracts and launches the real Proxifier installer. Meanwhile, it quietly continues the infection in the background: it creates another donor process and injects a module named proxifierupdater.exe. This module acts as yet another injector. It launches the system utility conhost.exe and injects it with another .NET app, internally named \u201cbin.exe\u201d, which runs a PowerShell script using the same method as before.<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205532\/clipbanker4.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-119345\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205532\/clipbanker4.png\" alt=\"\" width=\"770\" height=\"521\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205532\/clipbanker4.png 770w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205532\/clipbanker4-300x203.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205532\/clipbanker4-768x520.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205532\/clipbanker4-517x350.png 517w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205532\/clipbanker4-740x501.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205532\/clipbanker4-414x280.png 414w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\"><\/a><\/p>\n<p>The script is obfuscated and parts of it are encoded, but it really only performs four specific actions:<\/p>\n<ul>\n<li>Add the \u201cpowershell\u201d and \u201cconhost\u201d processes to Microsoft Defender exclusions.<\/li>\n<li>Create a registry key at <em>HKLMSOFTWARESystem::Config<\/em> and store another Base64-encoded PowerShell script inside it.<\/li>\n<li>Set up a scheduled task to launch PowerShell with another script as an argument. The script\u2019s task is to read the content of the created registry key, decode it, and transfer control to the resulting script.<\/li>\n<li>Ping an IP Logger service at https[:]\/\/maper[.]info\/2X5tF5 to let the attackers know the infection was successful.<\/li>\n<\/ul>\n<p>This wraps up the primary stage of the infection. As you can see, the Trojan attempts to use fileless (or bodiless) malware techniques. By executing malicious code directly in allocated memory, it leaves almost no footprint on the hard drive.<\/p>\n<p>The next stage is launched along with the task created in the scheduler. This is what it looks like:<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205615\/clipbanker5.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-119346\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205615\/clipbanker5.png\" alt=\"\" width=\"658\" height=\"232\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205615\/clipbanker5.png 658w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205615\/clipbanker5-300x106.png 300w\" sizes=\"auto, (max-width: 658px) 100vw, 658px\"><\/a><\/p>\n<p>The task launches the PowerShell interpreter, passing the script from the arguments as input. As we already mentioned, it reads the contents of the previously created Config registry key, then decodes and executes it. This is yet another PowerShell script whose job is to download the next script from hardcoded addresses and execute it. These addresses belong to Pastebin-type services, and the content located there is encoded in several different ways at once.<\/p>\n<div id=\"attachment_119347\" style=\"width: 1134px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205701\/clipbanker6.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-119347\" class=\"size-full wp-image-119347\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205701\/clipbanker6.png\" alt=\"Decoded and deobfuscated script from the Config registry key\" width=\"1124\" height=\"757\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205701\/clipbanker6.png 1124w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205701\/clipbanker6-300x202.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205701\/clipbanker6-1024x690.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205701\/clipbanker6-768x517.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205701\/clipbanker6-520x350.png 520w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205701\/clipbanker6-740x498.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205701\/clipbanker6-416x280.png 416w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205701\/clipbanker6-800x539.png 800w\" sizes=\"auto, (max-width: 1124px) 100vw, 1124px\"><\/a><\/p>\n<p id=\"caption-attachment-119347\" class=\"wp-caption-text\">Decoded and deobfuscated script from the Config registry key<\/p>\n<\/div>\n<p>The script from Pastebin continues the download chain. This time, the payload is located on GitHub.<\/p>\n<div class=\"mceTemp\"><\/div>\n<div id=\"attachment_119348\" style=\"width: 630px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205813\/clipbanker7.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-119348\" class=\"size-full wp-image-119348\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205813\/clipbanker7.png\" alt=\"Decoded script from Pastebin\" width=\"620\" height=\"143\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205813\/clipbanker7.png 620w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205813\/clipbanker7-300x69.png 300w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\"><\/a><\/p>\n<p id=\"caption-attachment-119348\" class=\"wp-caption-text\">Decoded script from Pastebin<\/p>\n<\/div>\n<p>It\u2019s a massive script, clocking in at around 500 KB. Interestingly, the bulk of the file is just one long Base64 string. After decoding it and doing some deobfuscation, we end up with a script whose purpose is quite clear. It extracts shellcode from a Base64 string, launches the fontdrvhost.exe utility, injects the shellcode into it, and hands over control.<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205857\/clipbanker8.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-119349\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205857\/clipbanker8.png\" alt=\"\" width=\"1563\" height=\"391\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205857\/clipbanker8.png 1563w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205857\/clipbanker8-300x75.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205857\/clipbanker8-1024x256.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205857\/clipbanker8-768x192.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205857\/clipbanker8-1536x384.png 1536w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205857\/clipbanker8-1399x350.png 1399w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205857\/clipbanker8-740x185.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205857\/clipbanker8-1119x280.png 1119w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08205857\/clipbanker8-800x200.png 800w\" sizes=\"auto, (max-width: 1563px) 100vw, 1563px\"><\/a><\/p>\n<p>The shellcode, in turn, unpacks and sets up the code for the final payload. This is classic ClipBanker-like malware, and there\u2019s nothing particularly fancy about it. It\u2019s written in C++, compiled with MinGW, doesn\u2019t bother with system persistence, and doesn\u2019t even connect to the network. Its entire job is to constantly monitor the clipboard for strings that look like crypto wallet addresses belonging to various blockchain-based networks (Cardano, Algorand, Ethereum, Bitcoin, NEM, Stellar, BNB, Cosmos, Dash, Monero, Dogecoin, MultiversX, Arweave, Filecoin, Litecoin, Neo, Osmosis, Solana, THOR, Nano, Qtum, Waves, TRON, Ripple, Tezos, and ZelCash), and then swap them with the attackers\u2019 own addresses.<\/p>\n<p>Here is the full list of replacement addresses:<\/p>\n<pre class=\"urvanov-syntax-highlighter-plain-tag\">addr1qxenj0dwefgmp9z4t4dgek3yh3d8cfzcl6u97x2ln8c4nljjv7xdw2u0jhfdy90arm0xr0das4kznrh8qj33dzu8z5fqdtusyt\r\nQSAROFQNKPXKKDNK67N5MQY5IQ4MTKGLI65KREVHKW53R2M6WHORP3ME2E\r\n0x97c16182d2e91a9370d5590b670f6b8dc755680552e40218a2b28ec7ad105071\r\nqrherxuw7fupud48l9xwvdcg7w64g8g7xvls9vgqyq\r\nbc1q88r38gk8ynrhdfur7yefwf5hrn2y56s90vlrvq\r\n36vf1gvZSxHkRRhAFiH6fotVWYEwH3tk22\r\n14U9sBVDRyEfPgR8h9QJatwtrodey4NeH4\r\nbc1phfm9d0fpqtgr9hkrxx5ww9k2qzww59q5czga95rtmk6vh5h8devsa72fxk\r\nbtg1qqfrsueknwmg92xrpch22wru0g4ka4p2vum3pdj\r\nAcRjmRuDswUeQHtxJnzAn496r9Lo8XQjUK\r\nGW9DJpw4mBJnVUWucX3szdH5bXZ9pqzLRF\r\nbnb18nqx60dx6dhhsdyddcl0653392w0v4yhx07knl\r\ncosmos10zqq0frph0rs36wwjg4r2r5626m6a2dgv3h6nv\r\nDskZFNcs5MKg9EdvhAnu87YGzWwVoBvd2tZ\r\nXj3KofSCPq97odR8hiFjfeZs2FqbwUbstk\r\nDJYXgJuBrc7cuGn4sgJXz1sdArKURkoWS9\r\nerd14n38wkxm9epjh0s2y8078yqqzy4ztq9ckczy883dwcfgd54peaqs3tp2k2\r\na2dB176hgduQopnJPrEGjfojRWSHwTS62Q\r\nf1qxoyqf3va2mwfbgzah3t7pqe7x5fmdev5dqc25a\r\ninj1qw709q8utgjhxrs2cqczhmz2w254dedllzmlef\r\nltc1q4calyk5x5g36ckpsrcr6ndtxdlc0ea9qs4h44n\r\nMCB8j9kXkX3f3BoXaBcsDc9RFoki9Kb3AR\r\nLhMGEmEGwxcGhCEQ7QmbC1hywRbHbbv6p8\r\n14FBxuV8HEuuWPFoFHbbG4Hm4pa7CqroQiGDeWvZdGiiJm8W\r\nosmo10zqq0frph0rs36wwjg4r2r5626m6a2dgy2y297\r\n7ATuKGME8AG9Tz5Qe4eRf1EAwqJNUvYXMiCGmtSbaJXR\r\nthor12x0nqpjz2djpuaxm2j2z963sawdcze3nhxacyu\r\nEQA28DFYnisowE0e49Sp2DUv6RKQWOJGbvegKWRPXE83bMnQ\r\nnano_1j9mjyi4q8qytb1r7yyqntzkyay5xo1wznnwmy9a3p9r371zb3d6wr6xs8y5\r\nQXwbqRnmxgmMZQk5WEvMYEBVzf1MP4eMY9\r\n3P7zSKMhfMPr5kd85xtHNmCx2gi9apCgnSP\r\nTNkGLYwtjcSk2A9U8cxJzttGeGEgz56hSP\r\nGB4XWREV3WOXWIWFE3DVX3FUNUXLOC7EEGXHZXRUKI5AMZAG3SV7EV4P\r\n46QtL5btfnq85iGrPDFabp4mxGhRbEZJaH67i5LhQsWhCnuiURKVU74QbMpf4TcZqgDnENMWaqhpt82vQSEdyBf4Tp1v8Y9\r\nrKwSuwgNNWn8P8x1ckUopKkErnPW3tVrz9\r\ntz1cPNzMxTsLzV1Gca2VowGgjRm7MkRzGLw5\r\nt1Nwwai9UsQxcgJVVbssnmfjfznhbq2v8ud\r\nZEPHYR2tzMbbkY7CCsShtADqstJLEeZfEiDHQeRchSg8FoqAn2XzsDD8eEEx5cweBQb4jX12DhfPz36c6TD6uV9fPrcFMqwzTn93Y<\/pre>\n<p>The complete execution chain, from the moment the malicious installer starts until the ClipBanker code is running, looks like this:<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08210027\/clipbanker9-scaled.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-119350\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08210027\/clipbanker9-scaled.png\" alt=\"\" width=\"2560\" height=\"1206\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08210027\/clipbanker9-scaled.png 2560w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08210027\/clipbanker9-300x141.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08210027\/clipbanker9-1024x482.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08210027\/clipbanker9-768x362.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08210027\/clipbanker9-1536x723.png 1536w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08210027\/clipbanker9-2048x965.png 2048w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08210027\/clipbanker9-743x350.png 743w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08210027\/clipbanker9-740x349.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08210027\/clipbanker9-594x280.png 594w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/08210027\/clipbanker9-800x377.png 800w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\"><\/a><\/p>\n<h2 id=\"victims\">Victims<\/h2>\n<p>Since the beginning of 2025, more than 2000 users of Kaspersky solutions have encountered this threat, most of them located in India and Vietnam. Interestingly, 70% of these detections came from the Kaspersky Virus Removal Tool, a free utility used to clean devices that are already infected. This underscores the importance of the preemptive protection: it is often cheaper and easier to prevent the infection than to face consequences of a successful attack.<\/p>\n<h2 id=\"conclusion\">Conclusion<\/h2>\n<p>This campaign is yet another perfect example of the old adage: \u201cbuy cheap, pay twice\u201d. Trying to save a buck on software, combined with a lack of caution when hunting for free solutions, can lead to an infection and the subsequent theft of funds \u2013 in this case, cryptocurrency. The attackers are aggressively promoting their sites in search results and using fileless techniques alongside a marathon infection chain to stay under the radar. Such attacks are difficult to detect and stop in time.<\/p>\n<p>To stay safe and avoid losing your money, use reliable security solutions that are able to prevent your device form being infected. Download software only from official sources. If for some reason you can\u2019t use a reputable paid solution, we highly recommend thoroughly vetting the sites you use to download software.<\/p>\n<h2 id=\"indicators-of-compromise\">Indicators of compromise<\/h2>\n<p><strong>URLs<\/strong><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/https%3A%2F%2Fpastebin.com%2Fraw%2Ffmpsdatq\/?icid=gl_sl_opentip-lnk_sm-team_7a9bf0755ccca876&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">https[:]\/\/pastebin[.]com\/raw\/FmpsDAtQ<\/a><\/p>\n<p><a href=\"https:\/\/opentip.kaspersky.com\/https%3A%2F%2Fchiaselinks.com%2Fraw%2Fnkkywvmhux\/?icid=gl_sl_opentip-lnk_sm-team_18fd715afadc6bfe&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">https[:]\/\/chiaselinks[.]com\/raw\/nkkywvmhux<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/https%3A%2F%2Frlim.com%2F55dfq32kar%2Fraw\/?icid=gl_sl_opentip-lnk_sm-team_3021efe71f3aa26f&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">https[:]\/\/rlim[.]com\/55Dfq32kaR\/raw<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/https%3A%2F%2Fpaste.kealper.com%2Fraw%2Fk3k5apjq\/?icid=gl_sl_opentip-lnk_sm-team_f8e6eb2e9ef38ae2&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">https[:]\/\/paste.kealper[.]com\/raw\/k3K5aPJQ<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/https%3A%2F%2Fgit.parat.swiss%2Frogers7%2Fdev-api%2Fraw%2Fmaster%2Fcpzn\/?icid=gl_sl_opentip-lnk_sm-team_f8a543963dbc8c29&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">https[:]\/\/git.parat[.]swiss\/rogers7\/dev-api\/raw\/master\/cpzn<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/https%3A%2F%2Fpinhole.rootcode.ru%2Frogers7%2Fdev-api%2Fraw%2Fmaster%2Fcpzn\/?icid=gl_sl_opentip-lnk_sm-team_a2d23d13d8740710&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">https[:]\/\/pinhole[.]rootcode[.]ru\/rogers7\/dev-api\/raw\/master\/cpzn<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/https%3A%2F%2Fgithub.com%2Flukecodix%2Fproxifier%2Freleases%2Fdownload%2F4.12%2Fproxifier.zip\/?icid=gl_sl_opentip-lnk_sm-team_2c7e83613545860f&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">https[:]\/\/github[.]com\/lukecodix\/Proxifier\/releases\/download\/4.12\/Proxifier.zip<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/https%3A%2F%2Fgist.github.com%2Fmsfcon5ol3%2F107484d66423cb601f418344cd648f12%2Fraw%2Fd85cef60cdb9e8d0f3cb3546de6ab657f9498ac7%2Fupxz\/?icid=gl_sl_opentip-lnk_sm-team_999b426c33f3e7e0&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">https[:]\/\/gist.github[.]com\/msfcon5ol3\/107484d66423cb601f418344cd648f12\/raw\/d85cef60cdb9e8d0f3cb3546de6ab657f9498ac7\/upxz<\/a><\/p>\n<p><strong>Hashes<\/strong><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/34a0f70ab100c47caaba7a5c85448e3d\/?icid=gl_sl_opentip-lnk_sm-team_7f2f12b04889915e&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">34a0f70ab100c47caaba7a5c85448e3d<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/7528bf597fd7764fcb7ec06512e073e0\/?icid=gl_sl_opentip-lnk_sm-team_6e5967bd88afe36b&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">7528bf597fd7764fcb7ec06512e073e0<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/8354223cd6198b05904337b5dff7772b\/?icid=gl_sl_opentip-lnk_sm-team_619137880168fffd&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">8354223cd6198b05904337b5dff7772b<\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>At the start of the year, a certain Trojan caught our eye due to its incredibly long infection chain. In most cases, it kicks off with a web search for \u201cProxifier\u201d. Proxifiers are speciaized software designed to tunnel traffic for programs that do not natively support proxy servers. They are a go-to for making sure [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[988,90,296,99,232,233,252,989,236,257],"tags":[91],"class_list":["post-2384","post","type-post","status-publish","format-standard","hentry","category-clipbanker","category-cybersecurity","category-github","category-malware","category-malware-descriptions","category-malware-technologies","category-powershell","category-proxifier","category-trojan","category-windows-malware","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The long road to your crypto: ClipBanker and its marathon infection chain - Imperative Business Ventures Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/09\/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The long road to your crypto: ClipBanker and its marathon infection chain - Imperative Business Ventures Limited\" \/>\n<meta property=\"og:description\" content=\"At the start of the year, a certain Trojan caught our eye due to its incredibly long infection chain. In most cases, it kicks off with a web search for \u201cProxifier\u201d. Proxifiers are speciaized software designed to tunnel traffic for programs that do not natively support proxy servers. They are a go-to for making sure [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/09\/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain\/\" \/>\n<meta property=\"og:site_name\" content=\"Imperative Business Ventures Limited\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-09T10:04:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/09085753\/SL-clipbanker-proxifier-featured-990x400.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/09\/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/09\/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"headline\":\"The long road to your crypto: ClipBanker and its marathon infection chain\",\"datePublished\":\"2026-04-09T10:04:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/09\/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain\/\"},\"wordCount\":1173,\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/09\/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/09085753\/SL-clipbanker-proxifier-featured-990x400.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"ClipBanker\",\"Cybersecurity\",\"GitHub\",\"Malware\",\"Malware descriptions\",\"Malware Technologies\",\"PowerShell\",\"Proxifier\",\"Trojan\",\"Windows malware\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/09\/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain\/\",\"url\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/09\/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain\/\",\"name\":\"The long road to your crypto: ClipBanker and its marathon infection chain - Imperative Business Ventures Limited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/09\/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/09\/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/09085753\/SL-clipbanker-proxifier-featured-990x400.jpg\",\"datePublished\":\"2026-04-09T10:04:09+00:00\",\"author\":{\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/09\/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/09\/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/09\/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain\/#primaryimage\",\"url\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/09085753\/SL-clipbanker-proxifier-featured-990x400.jpg\",\"contentUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/09085753\/SL-clipbanker-proxifier-featured-990x400.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/09\/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.ibvl.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The long road to your crypto: ClipBanker and its marathon infection chain\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.ibvl.in\/#website\",\"url\":\"https:\/\/blog.ibvl.in\/\",\"name\":\"Imperative Business Ventures Limited\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.ibvl.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/blog.ibvl.in\"],\"url\":\"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The long road to your crypto: ClipBanker and its marathon infection chain - Imperative Business Ventures Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/09\/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain\/","og_locale":"en_US","og_type":"article","og_title":"The long road to your crypto: ClipBanker and its marathon infection chain - Imperative Business Ventures Limited","og_description":"At the start of the year, a certain Trojan caught our eye due to its incredibly long infection chain. In most cases, it kicks off with a web search for \u201cProxifier\u201d. Proxifiers are speciaized software designed to tunnel traffic for programs that do not natively support proxy servers. They are a go-to for making sure [&hellip;]","og_url":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/09\/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain\/","og_site_name":"Imperative Business Ventures Limited","article_published_time":"2026-04-09T10:04:09+00:00","og_image":[{"url":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/09085753\/SL-clipbanker-proxifier-featured-990x400.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/09\/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain\/#article","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/09\/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain\/"},"author":{"name":"admin","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"headline":"The long road to your crypto: ClipBanker and its marathon infection chain","datePublished":"2026-04-09T10:04:09+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/09\/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain\/"},"wordCount":1173,"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/09\/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain\/#primaryimage"},"thumbnailUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/09085753\/SL-clipbanker-proxifier-featured-990x400.jpg","keywords":["Cybersecurity"],"articleSection":["ClipBanker","Cybersecurity","GitHub","Malware","Malware descriptions","Malware Technologies","PowerShell","Proxifier","Trojan","Windows malware"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/09\/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain\/","url":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/09\/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain\/","name":"The long road to your crypto: ClipBanker and its marathon infection chain - Imperative Business Ventures Limited","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/09\/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain\/#primaryimage"},"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/09\/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain\/#primaryimage"},"thumbnailUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/09085753\/SL-clipbanker-proxifier-featured-990x400.jpg","datePublished":"2026-04-09T10:04:09+00:00","author":{"@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"breadcrumb":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/09\/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.ibvl.in\/index.php\/2026\/04\/09\/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/09\/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain\/#primaryimage","url":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/09085753\/SL-clipbanker-proxifier-featured-990x400.jpg","contentUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/04\/09085753\/SL-clipbanker-proxifier-featured-990x400.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/09\/the-long-road-to-your-crypto-clipbanker-and-its-marathon-infection-chain\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.ibvl.in\/"},{"@type":"ListItem","position":2,"name":"The long road to your crypto: ClipBanker and its marathon infection chain"}]},{"@type":"WebSite","@id":"https:\/\/blog.ibvl.in\/#website","url":"https:\/\/blog.ibvl.in\/","name":"Imperative Business Ventures Limited","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.ibvl.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.ibvl.in"],"url":"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/2384","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/comments?post=2384"}],"version-history":[{"count":0,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/2384\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/media?parent=2384"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/categories?post=2384"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/tags?post=2384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}