MALICIOUS (1) campaign cataloged at 2024-09-25(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2024-09-old-faest¶
When using this library to do any request, a "validate_origin" function is called (L1320 in _client.py). This method, located in _utils.py, collects all request data, tries also read /etc/shadow using Docker container, and sends them to an endpoint controlled by the package author.
The package seems to be a clone of httpx and also informs in the README that it's a malicious library, as so, it seems to be a malicious research attempts.
Abuse categories¶
action-hidden-in-lib-usage
Campaign uses action-hidden-in-lib-usage.
clons_real_package
The package is a clone of a real package, but with malicious code added.
exfiltration_generic
Campaign uses exfiltration_generic.
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
-
hxxps://donkeyback.glitch.me/metrics/collect
-
donkeyback.glitch.me
-
hxxps://git.sr.ht/~wsmith/faest