MALICIOUS (1) campaign cataloged at 2025-02-24(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2025-02-coinanalyze¶
Package contains obfuscated code that exfiltrate basic data and awaits for commands from the remote server to execute them. This is a malicious copy of legitimate https://pypi.org/project/coinanalyse/ package.
Abuse categories¶
backdoor
Campaign uses backdoor.
clones_real_package
The package is a clone of a legitimate package or library, but with malicious code added.
crypto-related
Malicious activity is related to cryptocurrencies or blockchain, e.g. stealing crypto wallets.
obfuscation
Code uses obfuscation techniques to hide its true purpose.
remote_commands
The package contains code to execute remote commands (probably limited to a specific set) on the victim's machine.
typosquatting
The package name is an typosquatting variant of a popular package.
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
-
hxxps://wonderchristmas.store/jupdate.php -
wonderchristmas.store -
hxxp://netupdates.info/board/board.php -
netupdates.info