Skip to content

MALICIOUS (1) campaign cataloged at 2024-12-14(2).

  1. The campaign has clearly malicious intent, like infostealers.
  2. This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.

2024-12-httpfluent

The package contains highly obfuscated content, that install another, downloaded from a remote location obfuscated script in the installation path of the 'requests' package, and marks it as a hidden system file. In addition, another file contains a code that imitates doing some meaningful activity.

Later attempts hide the malicious code in a separated package, downloaded from Test PyPI.

Abuse categories

modify-system-without-consent

Campaign uses modify-system-without-consent.

obfuscation

Campaign uses obfuscation.

remote_script

Downloads and executes a remote malicious script.

URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.

  • hxxps://raw.githubusercontent.com/Red-haired-shanks-1337/repuests/refs/heads/main/puts.py

  • hxxps://test.pypi.org/simple/httpfluent/

  • hxxps://github.com/Red-haired-shanks-1337/Rwoka/raw/main/v0.1.0/httpfluent-0.1.tar.gz

Packages in the campaign

campaign:2024-12-httpfluent