MALICIOUS (1) campaign cataloged at 2025-05-09(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2025-05-pyiniter¶
File is designed to download, hide under system-like name, and run a remote executable, widely identified as malicious.
Abuse categories¶
infostealer
Campaign uses infostealer.
remote_executable
Downloads and executes a remote executable.
References¶
Referenced resources may include blog posts about the campaign, malware analysis, sandbox reports, or other relevant information.
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
hxxps://raw.githubusercontent.com/Sierftgddfgrth/win32dll/main/win32dll.exe