MALICIOUS (1) campaign cataloged at 2024-12-14(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2024-12-httpfluent¶
The package contains highly obfuscated content, that install another, downloaded from a remote location obfuscated script in the installation path of the 'requests' package, and marks it as a hidden system file. In addition, another file contains a code that imitates doing some meaningful activity.
Later attempts hide the malicious code in a separated package, downloaded from Test PyPI.
Abuse categories¶
modify-system-without-consent
Campaign uses modify-system-without-consent.
obfuscation
Campaign uses obfuscation.
remote_script
Downloads and executes a remote malicious script.
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
-
hxxps://raw.githubusercontent.com/Red-haired-shanks-1337/repuests/refs/heads/main/puts.py
-
hxxps://test.pypi.org/simple/httpfluent/
-
hxxps://github.com/Red-haired-shanks-1337/Rwoka/raw/main/v0.1.0/httpfluent-0.1.tar.gz