MALICIOUS (1) campaign cataloged at 2026-05-13(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2025-06-alembic-util¶
During installation, package exfiltrates some basic info to a GitHub issue comment, and then attempt to set up a persistent infostealer focused on exfiltrating crypto wallets and browsers data. Likely continuation of 2026-05-py-requests
Abuse categories¶
crypto-related
Malicious activity is related to cryptocurrencies or blockchain, e.g. stealing crypto wallets.
exfiltration_browser_data
Campaign uses exfiltration_browser_data.
exfiltration_crypto
The package attempts to steal sensitive cryptocurrency-related data, like wallet keys.
infostealer
Activity is typical for information stealers, i.e. by exfiltrate various sensitive data from the victim's environment.
override_install
The package overrides the install command in setup.py to execute malicious code during installation.
persistence
Campaign uses persistence.
remote_script
Downloads and executes a remote malicious script.
typosquatting
The package name is an typosquatting variant of a popular package.
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
-
hxxps://api.github.com/repos/guellemilb/c2-relay/issues/1/comments -
hxxps://gist.githubusercontent.com/guellemilb/631fb6348967d9d475125edf67048c0e/raw/build_utils.py/raw/pyrat_light.py -
hxxps://gist.githubusercontent.com/guellemilb/631fb6348967d9d475125edf67048c0e/raw/build_utils.py