MALICIOUS (1) campaign cataloged at 2024-12-01(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2024-12-BetterMint¶
While the package appears to be a manager for Windows service, the linked executable is an infostealer with capabilities like cookie stealing ang keylogger. The package only supports installing it
Abuse categories¶
exfiltration_browser_data
Campaign uses exfiltration_browser_data.
exfiltration_generic
Campaign uses exfiltration_generic.
infostealer
Campaign uses infostealer.
keylogger
Campaign uses keylogger.
remote_executable
Downloads and executes a remote executable.
sandbox-detection
The package contains code to detect if it is running in a sandbox environment.
References¶
Referenced resources may include blog posts about the campaign, malware analysis, sandbox reports, or other relevant information.
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
hxxps://github.com/yesjdnke/manager/releases/download/love/system_service.exe