MALICIOUS (1) campaign cataloged at 2024-08-10(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2024-08-app-url-to-telegram¶
Imitate legit package, when used, sends out the URL of web application using the package
Abuse categories¶
action-hidden-in-lib-usage
The malicious action is hidden in the code and starts when user interacts with it (e.g. during class initialization or by exfiltrating given credentials).
basic_exfiltration
The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.
clones_real_package
The package is a clone of a legitimate package or library, but with malicious code added.
dependency-confusion
An attempt to exploit dependency confusion
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
hxxps://api.telegram.org/bot7168168551:AAEmMGUSJ_Pd7l6YAMQs-ySXM1FXueUOJtY/sendMessage?chat_id=6977902769&text=