MALICIOUS (1) campaign cataloged at 2024-12-24(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2024-12-reqesst¶
Importing the module downloads and starts an infostealer attempting to exfiltrate data and establishing persistence through autorun directory.
Abuse categories¶
clones_real_package
The package is a clone of a legitimate package or library, but with malicious code added.
dependency-confusion
An attempt to exploit dependency confusion
exfiltration_browser_data
Campaign uses exfiltration_browser_data.
exfiltration_crypto
The package attempts to steal sensitive cryptocurrency-related data, like wallet keys.
exfiltration_generic
Campaign uses exfiltration_generic.
infostealer
Activity is typical for information stealers, i.e. by exfiltrate various sensitive data from the victim's environment.
peristence_autorun
Campaign uses peristence_autorun.
remote_executable
Downloads and executes a remote executable.
typosquatting
The package name is an typosquatting variant of a popular package.
References¶
Referenced resources may include blog posts about the campaign, malware analysis, sandbox reports, or other relevant information.
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
hxxps://www.dropbox.com/scl/fi/d4ftoxxvovr12f4tjh0mc/H7Glqp2Vy.exe?rlkey=z323u7r1ipm2tegn2dqlqzv9l&st=9gg48qpa&dl=1