MALICIOUS (1) campaign cataloged at 2024-10-07(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2024-10-innostage¶
When imported, the package download and runs a remote stage - a reverse shell. To mask activity, the remote domain is made to mimic PyPI host: files[.]pythonhosted[.]ru
Abuse categories¶
revshell
The package contains code to create a reverse shell, allowing an attacker to execute any commands on the victim's machine.
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
-
files.pythonhosted.ru
-
pythonhosted.ru
-
hxxp://files.pythonhosted.ru/56788.txt
-
hxxp://files.pythonhosted.ru/56789.txt
-
files.inostage.ru