CoinClipper is a stealth-focused clipboard monitoring tool written in C#. It detects cryptocurrency wallet addresses in clipboard content and replaces them with predefined attacker-controlled addresses. This behavior mimics real-world clipboard hijackers used in active threat campaigns targeting cryptocurrency users.
β οΈ This tool is for educational and authorized penetration testing use only. Running this code on machines you do not own or do not have explicit permission to test is illegal and unethical.
- π Clipboard Monitoring: Monitors clipboard content for a variety of cryptocurrency address patterns in real-time.
- π Address Replacement: Automatically swaps detected addresses with attacker-specified ones.
- π» Stealth Techniques:
- Hidden windowless operation via background thread.
- Delayed execution using randomized sleep and CPU-burn routines (
Snoozy
class).
- 𧬠Persistence Mechanism:
- Self-replication into
AppData\Microsoft\SystemData
with randomized executable name. - Generates
.ps1
and.vbs
scripts for execution from the userβs Startup folder.
- Self-replication into
Coin | Regex Pattern |
---|---|
Bitcoin (BTC) | `\b(bc1 |
Ethereum (ETH) | \b0x[a-fA-F0-9]{40}\b |
TRON (TRC20) | T[A-Za-z1-9]{33} |
Litecoin (LTC) | `\b(L |
Dogecoin (DOGE) | \bD[a-km-zA-HJ-NP-Z1-9]{33}\b |
Monero (XMR) | \b4[0-9AB][1-9A-HJ-NP-Za-km-z]{93}\b |
Ripple (XRP) | \br[1-9A-HJ-NP-Za-km-z]{24,34}\b |
CoinClipper/
βββ Program.cs // Main entry point with randomized sleep and clipboard thread logic
βββ Clip.cs // Core logic for clipboard regex matching and replacement
βββ ClipboardFunc.cs // Safe clipboard read/write utilities
βββ ClipboardMonitorForm.cs // Hidden WinForms listener using WM_CLIPBOARDUPDATE
βββ Snoozy.cs // Randomized delays and CPU simulation (anti-analysis)
βββ Copy.cs // Self-copy, persistence, and startup logic
β οΈ Legal Disclaimer
This software is provided for educational purposes only and is intended solely for use in authorized penetration testing environments, such as virtual labs, red team simulations, or malware research.
Do not deploy or distribute this software in production environments or on systems without proper consent. Misuse of this tool may violate computer misuse laws and carry significant legal penalties.
π Credits
Regex patterns sourced from research on common cryptocurrency address formats.
Persistence techniques inspired by real-world malware analysis.
Clipboard interception via native Win32 messaging and AddClipboardFormatListener.
𧩠Future Enhancements (Optional)
Add dynamic address fetch from C2 or encrypted config.
Implement address whitelist/blacklist logic.
Obfuscation support or integration with packers like ConfuserEx.
SCAN RESULTS: https://websec.net/scanner/result/525e6e46-a10f-4c62-ab50-0eb1846f2256