Skip to content

MALICIOUS (1) campaign cataloged at 2025-05-16(2).

  1. The campaign has clearly malicious intent, like infostealers.
  2. This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.

2025-05-coloraiz

The package imitates colorama, and places a proxy object over the original colorama module that on every usage executes a remote code. The remote script installs a backdoor through legitimate tunnelling software and upload access credentials to the attacker.

Abuse categories

action-hidden-in-lib-usage

The malicious action is hidden in the code and starts when user interacts with it (e.g. during class initialization or by exfiltrating given credentials).

backdoor

Campaign uses backdoor.

clones_real_package

The package is a clone of a legitimate package or library, but with malicious code added.

impersonation

Campaign uses impersonation.

remote_script

Downloads and executes a remote malicious script.

URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.

  • hxxps://mp14dea413c69b2bf527.free.beeceptor.com/code

  • free.beeceptor.com

Packages in the campaign

campaign:2025-05-coloraiz