Malware Lifecycle & MITRE ATT&CK Mapping
Initial Access (T1566.001)
Spearphishing with PDF attachments featuring blurred images and fake Adobe update pop-ups.
Execution (T1059.005)
GOGITTER downloader creates VBScripts in %APPDATA% and Public folders.
Persistence (T1053.005)
Scheduled tasks execute the VBScript payload every 50 minutes.
Command and Control (T1102.002)
Sheet Attack leverages Google Sheets and Firebase.
Gopher Strike uses private GitHub repositories (e.g., github[.]com/jaishankai/sockv6) to poll command.txt and upload result.txt.
Defense Evasion (T1027.001)
GOSHELL loader file size is artificially inflated to
~1GB using junk bytes to bypass antivirus scanners. It also features hostname-based execution checks.
Remediation - THE ENTERPRISE TRACK
Blast Radius & Containment
Network Isolation
Block traffic to the known infection signal domain adobe-acrobat[.]in.
Identity Security
Review OIDC/SAML logs for unusual activity involving GitHub or Google Workspace accounts, as actors use legitimate SaaS for exfiltration.
TTP & Forensic Indicators
Host-Based Indicators
Monitor for file creation of edgehost[.]exe or adobe_update.zip in C:\Users\Public\Downloads and C:\Users\Public\Pictures.
Persistence Check
Inspect scheduled tasks for any scripts running at 50-minute intervals.
Detection Engineering
SIEM Logic
Alert on cURL commands downloading RAR archives from non-standard external repositories.
File Size Monitoring
Implement rules to flag or sandbox Portable Executable (PE) files with suspicious overlays (e.g., jump from normal size to ~1GB).
Governance
In accordance with NIST SP 800-61 Rev. 2, document all identified IOCs and report findings to relevant national authorities (e.g., Indian CERT-In) if organizational data is compromised.
Remediation - THE HOME USER TRACK
Safety
If you encounter a PDF that requests an "Adobe Acrobat Reader" update to view content,
immediately disconnect from the internet and delete the file.
Run a full offline scan using a reputable antivirus (ensure definitions are updated).
Identity
Change passwords for Google and GitHub accounts if you have interacted with suspicious links or files, as these services are leveraged by the attacker.
Persistence
Check "Task Scheduler" (search in Start menu) for any unfamiliar tasks set to run periodically and disable them.
Hardening & References
CIS Controls
Implement Control 7 (Email and Web Browser Protections) to block malicious URL categories.
NIST Framework
Follow NIST SP 800-83 for Malware Incident Prevention and Handling.
Relevant Sources
Zscaler ThreatLabz Research (Sept 2025/Jan 2026).
SANS FOR508
Advanced Incident Response.