MALICIOUS (1) campaign cataloged at 2025-02-25(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2025-02-kgmicolors¶
Package contains hidden code that downloads a next stage script, which finally downloads and starts a malware from XWORM family as well as an infostealer
Abuse categories¶
infostealer
Campaign uses infostealer.
malware
Campaign uses malware.
remote_script
Downloads and executes a remote malicious script.
References¶
Referenced resources may include blog posts about the campaign, malware analysis, sandbox reports, or other relevant information.
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
-
hxxps://raw.githubusercontent.com/Uwu-Kagami/multi-tool/refs/heads/main/modules/base_modules/requirements/load_modules.py
-
hxxps://github.com/Uwu-Kagami/ConfigSecurityPolicy/raw/refs/heads/main/WinSysDrivers.zip
-
hxxps://github.com/Uwu-Kagami