Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Select an option

  • Save justaguywhocodes/0fd097b5ef3a0dd6cc233ac020e9ac59 to your computer and use it in GitHub Desktop.

Select an option

Save justaguywhocodes/0fd097b5ef3a0dd6cc233ac020e9ac59 to your computer and use it in GitHub Desktop.
Some analysis:
- The script gathers various system details such as the hostname, platform, home directory, and temporary directory (os.hostname(), os.platform(), os.homedir(), os.tmpdir()).
- It checks for the existence of specific directories and files, particularly those related to web browsers like Chrome, Brave, and Opera. It attempts to read these directories and files, which contain potentially sensitive information (e.g., user profiles, extension data).
- It tries to steal macOS keychains, solana wallet keys.
- The script attempts to upload collected data to a remote server (95.164.17.24) hosted in the Netherlands, indicating data exfiltration. It uses the request module to send POST requests with the stolen data.
- It includes mechanisms to ensure it runs multiple times, possibly to ensure persistence or continued data exfiltration. The script also tries to download and execute additional payloads from the remote server, which could be more malicious scripts or executables.
- The script scans for browser extensions and profiles, likely to gather more specific user data or credentials.
- It has different paths and behaviors depending on whether the OS is Windows (w), Linux (l), or macOS (d).
- The additional payloads are python payloads and are easily accessible by following the breadcrumbs of URLs, essentially it installs some form of RAT, it does keylogging etc, sets up comms with a C&C server
- A final python payload attempts again to steal credentials and credit card data stored in browser files.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment