Skip to main content

Command Palette

Search for a command to run...

Unmasking Infostealer: Don't Believe What You See...

Updated
4 min read
Unmasking Infostealer: Don't Believe What You See...

Introduction

Imagine stumbling across a seemingly harmless script while hunting for tools online, only to uncover a sophisticated malware designed to steal passwords, session tokens, and cookies. That’s exactly what happened to me, and it sent me down a rabbit hole of investigation. In this blog post, I’ll take you on that journey.

The Start of the Journey

It all began when I was searching GitHub for a HTTP flooding DoS script for penetration testing. Like everyone else, I was looking for existing code because, well, why reinvent the wheel, right? That’s when I stumbled upon a GitHub repository (Azepofff/Adv-DDOS) on the first page of my search results.

At first glance, the source code looked normal. But do you notice anything suspicious? Probably not, unless you scroll all the way to the right or click the "Raw" button on GitHub—which is how I noticed the malicious code.

Hidden at the end of the script, after a semicolon, was a line of code that installs the fernet module, decrypts an encrypted string, and executes it. This immediately raised a red flag, and I knew I had to dig deeper.

Digging Deeper

I decrypted the encrypted string locally (without executing it) and discovered a URL pointing to a suspicious domain: 1312services[.]ru. Naturally, my next step was to investigate this domain.

I tried accessing it via a browser, but Cloudflare blocked my request.

I attempted to use curl, but the request was still blocked.

Surprisingly, I managed to access the content using the Python requests module.

This revealed that Cloudflare was likely configured to block all requests except those with the default User-Agent header of the requests module. For reference, here’s the default User-Agent of the requests module (version 2.32.3): python-requests/2.32.3

For an added tip, you can send HTTP GET request to http://httpbin.org/headers to see the headers of your request without intercepting it.

Uncovering the Payload

The response contained Python code that created a file named gruppe.py under the C:\Users\<Username>\AppData\Roaming directory, clearly targeting Windows users. The script wrote a string stored in a content variable to this file and then executed it.

To further analyze this, I copied the string into another file. This revealed another Python script, which also decrypted an encrypted string and executed it. Upon decrypting this text, I uncovered 620 lines of Python code, which is the main payload script.

I’ve shared the payload code in this gist: https://gist.github.com/kcnaiamh/ad72bf34957eaf3c144f8a0899233128

Analyzing the Payload

Given the script’s size, I used ChatGPT to get a quick understanding of its functionality. Here’s what I found:

What the Script Does

This malware is designed to steal sensitive data from the victim’s system. It:

  • Targets Chromium-Based Browsers:

    • Steals passwords, cookies, and tokens by decrypting browser-stored credentials.

    • Extracts data from popular browsers like Chrome, Edge, Brave, and Opera.

  • Targets Cryptocurrency Wallets:

    • Accesses wallets such as MetaMask, Exodus, and Atomic Wallet.

    • Extracts data from browser extensions linked to these wallets.

  • Targets Messaging Apps:

    • Extracts authentication tokens and session cookies from Discord and Telegram.
  • Searches for Sensitive Files:

    • Scans common directories (e.g., Desktop, Documents) for files containing keywords like "password," "wallet," or "crypto."
  • Persistence Mechanism:

    • Saves itself in the Windows Startup folder to ensure it runs on system reboot.

Overall Observation

Remember the domain name? I did a WHOIS lookup to gather more information.

While I didn’t dive too deeply, I suspect the GitHub user “Azepofff” may be linked to Russia. Every repository from this account is designed for deploying the infostealer malware. Groups like these typically steal credentials to further spread malware, infect systems with ransomware if they gain access to critical infrastructure, or sell initial access on hacker forums. They also pilfer cryptocurrency whenever possible.

This is their business model—and unfortunately, it seems to be a profitable one.

If you have the time, please consider reporting this GitHub user.

Final Thoughts

When using code from unknown sources, simply reading it isn’t enough. You need to dig deeper and examine hidden sections to ensure attackers haven’t sneakily inserted malicious code.

More from this blog

U

Untitled Publication

24 posts