MALICIOUS (1) campaign cataloged at 2024-11-13(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2024-11-tingetone¶
Importing the module starts the banner() function, which downloads and runs an obfuscated remote script. The package seems to be a clone a one of existing similar packages.
Abuse categories¶
clons_real_package
The package is a clone of a real package, but with malicious code added.
obfuscation
Campaign uses obfuscation.
remote_executable
Downloads and executes a remote executable.
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
hxxps://tinyurl.com/f0reUpdate