Skip to content

MALICIOUS (1) campaign cataloged at 2024-10-07(2).

  1. The campaign has clearly malicious intent, like infostealers.
  2. This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.

2024-10-innostage

When imported, the package download and runs a remote stage - a reverse shell. To mask activity, the remote domain is made to mimic PyPI host: files[.]pythonhosted[.]ru

Abuse categories

revshell

The package contains code to create a reverse shell, allowing an attacker to execute any commands on the victim's machine.

URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.

  • files.pythonhosted.ru

  • pythonhosted.ru

  • hxxp://files.pythonhosted.ru/56788.txt

  • hxxp://files.pythonhosted.ru/56789.txt

  • files.inostage.ru

Packages in the campaign

campaign:2024-10-innostage