MALICIOUS (1) campaign cataloged at 2026-04-04(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2026-04-gangomodule¶
During installation, obfuscated code validates the environment against typical sandboxing signs and attempts to download the next stages from remote sources. The remote stage is a comprehensive infostealer collecting credentials from files and process memory, especially SSH keys, and covering tracks to make the forensic analysis more difficult. Naming suggests relation with a toolkit called "Aether"
Abuse categories¶
covering-tracks
The package contains code to cover its tracks, e.g. by deleting malicious code after execution.
exfiltration_credentials
The package attempts to steal credentials, like passwords or API keys.
exfiltration_env_variables
Campaign uses exfiltration_env_variables.
exfiltration_generic
Campaign uses exfiltration_generic.
exfiltration_ssh_keys
Campaign uses exfiltration_ssh_keys.
files_exfiltration
Campaign uses files_exfiltration.
infostealer
Activity is typical for information stealers, i.e. by exfiltrate various sensitive data from the victim's environment.
obfuscation
Code uses obfuscation techniques to hide its true purpose.
remote_script
Downloads and executes a remote malicious script.
sandbox-detection
The package contains code to detect if it is running in a sandbox environment.
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
-
godver3isthe.one -
hxxps://gist.githubusercontent.com/Kostiantyntem/03e0d92babe2a8a835f9718504acaaee/raw/f9c83934de3172d107df839902eb03a36bb31e22/c2.txt -
hxxps://godver3isthe.one/stage2/windows/x86_64.zip -
hxxps://godver3isthe.one/stage2/linux/x86_64.zip