back

Malware Analysis

Deep dive into what the stolen payloads actually do. Source: rubenmarcus/malicious-repositories

C2 Server Configuration

Decoded from the Golden City payload. All ports on the same IP.

mainServer

144.172.94.226:6961

Reverse shell (full remote access)

uploadServer

144.172.94.226:6966

File exfiltration

keyServer

144.172.94.226:6967

Encryption key exchange

logServer

144.172.94.226:6968

Activity logging

Attack Flow Diagram

1

eval() fetches obfuscated JS from npoint.io

The initial payload is hosted on a free JSON hosting service. The eval() call downloads and immediately executes the first-stage malware.

2

Suppresses all errors

Installs process.on('uncaughtException', () => {}) to silently swallow all errors. The victim sees no warnings, crashes, or stack traces.

3

Creates reverse shell to C2 every 5 seconds

Opens a persistent TCP connection to 144.172.94.226:6961. Reconnects every 5 seconds if dropped. Gives attacker full terminal access.

4

Monitors clipboard for passwords

Polls the system clipboard every 500ms. Captures copied passwords, seed phrases, API keys, and 2FA codes. Sends them to the C2 log server.

5

Scans and uploads sensitive files

Recursively searches for .env, .config, .ssh/, wallet files, browser profiles, documents, and source code. Uploads everything to the exfiltration server.

6

Executes arbitrary commands from C2

The reverse shell accepts any command from the attacker. Full system access: install more malware, pivot to other machines, encrypt files.

Disguise Locations

13 repositories with their malware injection points.

RepoMalware FileAttack Type
golden-citybackend/controllers/userController.jsByte-array URL obfuscation + new Function()SCAN
multify_stakingnext.config.jsObfuscated code before legitimate configSCAN
munity-gameserver/routes/paymentRoute.jseval() in payment routeSCAN
erc20-token-dappvite.config.jsMalicious npm package (cdn-icon-fetch)SCAN
sarostech-assessmentserver/config/getContract.jsnew Function() with requireSCAN
web3gamesrc/utils/wallet.jseval() + w3capi.marketing exfilSCAN
real_estateserver/controllers/userController.jsRemote eval() via npoint.ioSCAN
real_estate_newserver/controllers/paymentController.jsRemote eval() via npoint.ioSCAN
real-estate-rental-platformbackend/utils/authHelper.jsRemote eval() via npoint.ioSCAN
coinpool-rental-platform1.0server/controllers/paymentController.jsRemote eval() via npoint.ioSCAN
DEX-staking-project-ultraxsrc/utils/wallet.jsRemote eval() via npoint.ioSCAN
trend-dev-preproductionbackend/controller.jsRemote eval() via npoint.ioSCAN
challenge-experiment-modulesetup.jsByte-array obfuscationSCAN

Known C2 Domains & IPs

All known command-and-control infrastructure. Block these on your network.

144.172.94.226:6961
IP
144.172.94.226:6966
IP
144.172.94.226:6967
IP
144.172.94.226:6968
IP
api.npoint.io
Domain
w3capi.marketing
Domain
mglcoin.io
Domain
flickthebean.onrender.com
Domain
nvidia-release.org
Domain
nvidia-release.us
Domain
camera-drive.cloud
Domain
nvidia-drive.cloud
Domain
chainlink-api-v3.com
Domain
ip-api-test.vercel.app
Domain
vscode-config-settings.vercel.app
Domain
api-web3-auth.vercel.app
Domain