Skip to content

MALICIOUS (1) campaign cataloged at 2026-04-04(2).

  1. The campaign has clearly malicious intent, like infostealers.
  2. This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.

2026-04-gangomodule

During installation, obfuscated code validates the environment against typical sandboxing signs and attempts to download the next stages from remote sources. The remote stage is a comprehensive infostealer collecting credentials from files and process memory, especially SSH keys, and covering tracks to make the forensic analysis more difficult. Naming suggests relation with a toolkit called "Aether"

Abuse categories

covering-tracks

The package contains code to cover its tracks, e.g. by deleting malicious code after execution.

exfiltration_credentials

The package attempts to steal credentials, like passwords or API keys.

exfiltration_env_variables

Campaign uses exfiltration_env_variables.

exfiltration_generic

Campaign uses exfiltration_generic.

exfiltration_ssh_keys

Campaign uses exfiltration_ssh_keys.

files_exfiltration

Campaign uses files_exfiltration.

infostealer

Activity is typical for information stealers, i.e. by exfiltrate various sensitive data from the victim's environment.

obfuscation

Code uses obfuscation techniques to hide its true purpose.

remote_script

Downloads and executes a remote malicious script.

sandbox-detection

The package contains code to detect if it is running in a sandbox environment.

URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.

  • godver3isthe.one

  • hxxps://gist.githubusercontent.com/Kostiantyntem/03e0d92babe2a8a835f9718504acaaee/raw/f9c83934de3172d107df839902eb03a36bb31e22/c2.txt

  • hxxps://godver3isthe.one/stage2/windows/x86_64.zip

  • hxxps://godver3isthe.one/stage2/linux/x86_64.zip

Packages in the campaign

campaign:2026-04-gangomodule