MALICIOUS (1) campaign cataloged at 2025-11-15(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2025-11-spellcheckers¶
Packages contain hidden code that is effectively run during importing or using the library, and downloads second stage code. Then, a process running in background periodically connects to a remote host and waits for next code to execute
Abuse categories¶
obfuscation
Campaign uses obfuscation.
remote_commands
The package contains code to execute remote commands (probably limited to a specific set) on the victim's machine.
remote_script
Downloads and executes a remote malicious script.
References¶
Referenced resources may include blog posts about the campaign, malware analysis, sandbox reports, or other relevant information.
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
-
hxxps://dothebest.store/allow/inform.php -
hxxps://dothebest.store/refresh.php -
dothebest.store -
hxxps://searchbox.info/prefer.php -
searchbox.info