MALICIOUS (1) campaign cataloged at 2024-09-19(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2024-09-pdf2doc¶
During installation, the code attempts to exfiltrate basic data (username, host name) and send to the attacker. The package looks to be a clone of an existing one
Abuse categories¶
basic_exfiltration
The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.
clones_real_package
The package is a clone of a legitimate package or library, but with malicious code added.
dependency-confusion
An attempt to exploit dependency confusion
obfuscation
Code uses obfuscation techniques to hide its true purpose.
override_install
The package overrides the install command in setup.py to execute malicious code during installation.
typosquatting
The package name is an typosquatting variant of a popular package.
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
partywave.site