MALICIOUS (1) campaign cataloged at 2025-05-15(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2025-05-rich-figlet¶
Malicious clone of pyfiglet. Importing the package starts a series of downloading and executing of obfuscated malicious scripts, partially identified by AVs.
Abuse categories¶
backdoor
Campaign uses backdoor.
clons_real_package
The package is a clone of a real package, but with malicious code added.
obfuscation
Campaign uses obfuscation.
remote_script
Downloads and executes a remote malicious script.
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
-
185.254.198.245
-
hxxp://185.254.198.245:8080/update?token=4z1m6qbi4vzpwykp8YK4wAeZX89gbdwSy3dSCBGy2rkMjG5D0Alp5WO1RgktLeYk&platform=
-
hxxp://185.254.198.245:80/admin/get.php
-
hxxp://185.254.198.245:80/login/process.php