MALICIOUS (1) campaign cataloged at 2024-12-26(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2024-12-syscontrol¶
Importing the module starts downloading and executing an Infostealer targeting browsers' and Discord data
In first packages, there was a hidden line triggering downloading and running an infostealer
Abuse categories¶
action-hidden-in-lib-usage
The malicious action is hidden in the code and starts when user interacts with it (e.g. during class initialization or by exfiltrating given credentials).
exfiltration_browser_data
Campaign uses exfiltration_browser_data.
exfiltration_crypto
The package attempts to steal sensitive cryptocurrency-related data, like wallet keys.
infostealer
Activity is typical for information stealers, i.e. by exfiltrate various sensitive data from the victim's environment.
infostealer:kiwi
Campaign uses infostealer:kiwi.
obfuscation
Code uses obfuscation techniques to hide its true purpose.
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
-
hxxp://45.142.115.225:8000/grab/DaTDTcxiSvq9OA6r -
hxxp://45.142.115.225:8000/inject/DaTDTcxiSvq9OA6r -
hxxp://45.142.115.225:8000/grab/DaTDTcxiSvq9OA6r -
hxxp://45.142.115.225:8000/repeter/DaTDTcxiSvq9OA6r -
hxxps://cdn.discordapp.com/attachments/1086668425797058691/1113770559688413245/app.asar -
hxxps://cdn.discordapp.com/attachments/1135684724585681039/1143224080603037827/app.asar -
45.142.115.225