Elastic Safety Labs has uncovered a complicated malware marketing campaign, dubbed REF8685, focusing on the Iraqi telecommunications sector.
The marketing campaign makes use of a novel malware household known as SHELBY, which abuses GitHub for command-and-control (C2) operations, information exfiltration, and command retrieval.
Novel Malware Household Targets Iraqi Telecommunications Sector
The SHELBY malware household consists of two primary parts: SHELBYLOADER and SHELBYC2.


The assault chain begins with a phishing e mail containing a malicious attachment (particulars.zip) that, when executed, installs a number of recordsdata within the %AppDatapercentLocalMicrosoftHTTPApi listing.
These recordsdata embody HTTPApi.dll (SHELBYC2) and HTTPService.dll (SHELBYLOADER).
SHELBYLOADER employs numerous sandbox detection strategies to evade evaluation, together with WMI queries, course of enumeration, file system checks, and disk measurement evaluation.
As soon as executed, it establishes persistence by including an entry to the Home windows Registry and generates a singular identifier for the contaminated machine based mostly on system-specific info.
Progressive C2 Infrastructure Leverages GitHub API
The malware’s C2 infrastructure is constructed round GitHub’s API, utilizing a non-public repository and a Private Entry Token (PAT) embedded inside the binary.
This permits the malware to authenticate and carry out actions on the repository with out utilizing customary Git instruments.
SHELBYC2, the backdoor element, is loaded into reminiscence utilizing reflection after being decrypted with an AES key derived from a file downloaded from the C2 server.
It helps numerous instructions, together with file obtain, add, and the power to reflectively load extra .NET binaries.


Whereas progressive, the C2 design has a important flaw: anybody with entry to the PAT can probably management contaminated machines or entry delicate information, exposing victims to extra dangers.
The REF8685 marketing campaign demonstrates subtle social engineering techniques, leveraging compromised inner e mail accounts to craft extremely convincing phishing lures.
The attackers have additionally focused different entities within the area, together with a world airport within the United Arab Emirates.
Elastic Safety Labs has launched YARA guidelines to assist detect SHELBY malware variants.
Because the malware exhibits indicators of ongoing growth, together with unused code and dynamic payload loading capabilities, future updates might deal with present vulnerabilities and develop its performance.
This marketing campaign highlights the evolving techniques of menace actors and the significance of strong e mail safety, worker coaching, and steady monitoring of community actions to defend towards such superior persistent threats.
Are you from SOC/DFIR Groups? – Analyse Malware, Phishing Incidents & get dwell Entry with ANY.RUN -> Begin Now for Free.