MALICIOUS (1) campaign cataloged at 2024-09-19(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2024-09-pdf2doc¶
During installation, the code attempts to exfiltrate basic data (username, host name) and send to the attacker. The package looks to be a clone of an existing one
Abuse categories¶
basic_exfiltration
The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.
clons_real_package
The package is a clone of a real package, but with malicious code added.
dependency-confusion
Campaign uses dependency-confusion.
obfuscation
Campaign uses obfuscation.
override_install
The package overrides the install command in setup.py to execute malicious code during installation.
typosquatting
Campaign uses typosquatting.
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
partywave.site