This campaign demonstrates a highly modular approach using the Go programming language to increase cross-platform compatibility and complicate static analysis.
GOGITTER (Downloader)
Acts as the initial stage, responsible for establishing a foothold and downloading the secondary payloads from attacker-controlled infrastructure.
GITSHELLPAD (Backdoor)
A custom backdoor designed for persistent access, likely utilizing Git-based protocols or similar communication channels for command and control (C2), allowing for remote shell execution.
GOSHELL (Loader)
A specialized loader that decrypts and executes the final Cobalt Strike Beacon in memory to evade file-based antivirus solutions.
Supply Chain & Delivery
Initial entry is typically achieved through targeted phishing or the distribution of malicious ISO/ZIP files masquerading as official government documentation.
Remediation & Recovery
Enterprise Mitigation (NIST 800-61r2 Alignment)
Identity & Access Management
Perform an immediate
global session revocation for all OIDC/SAML tokens to terminate potential unauthorized persistent shell sessions.
Reset MFA seeds for any account identified in the telemetry as having logged in from anomalous IP ranges.
Network Containment
Block known C2 domains and IP addresses associated with Gopher Strike at the perimeter firewall and DNS levels.
Monitor for unusual outbound traffic on non-standard ports, specifically looking for Go-based binary communications.
Persistence Removal
Audit scheduled tasks and registry run keys (HKLM\Software\Microsoft\Windows\CurrentVersion\Run) for suspicious entries pointing to user directories (e.g., %AppData%).
Home User Remediation
System Scans
Run a full system scan with a reputable antivirus. Go-based malware often generates large binaries that may trigger heuristic detections.
Account Security
Change passwords for your primary email and banking accounts from a
different, clean device. Enable app-based MFA (e.g., Google Authenticator) instead of SMS.
Clean Reinstall
If suspicious behavior continues (e.g., unexpected CMD windows), the most reliable method for home users is to back up essential documents (not programs) and perform a clean "Reset this PC" with the "Remove everything" option.
Post-Incident Hardening
For Enterprise
Implement
CIS Benchmark - Windows 10/11 Section 18.9: "Restrict PowerShell Execution Policy." Setting this to "AllSigned" or "Restricted" via Group Policy can significantly hinder the lateral movement phase of the GOSHELL/Cobalt Strike chain.
For Home Users
Ensure your browser is configured to block automatic downloads and treat any unexpected ZIP or ISO file from an email with extreme suspicion—never open these files unless verified through a secondary channel.
References
Zscaler ThreatLabz Analysis
NIST SP 800-61 Rev. 2
(Computer Security Incident Handling Guide)