MALICIOUS (1) campaign cataloged at 2025-12-15(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2025-12-smtblib¶
Malicious copy of a standard library module that during class initialization downloads and executes remote code and after that attempts to cover its tracks by overwriting itself with non-malicious code. The remote code aims to collect and exfiltrate sensitive Telegram session files.
This campaign shares infrastructure and basic methods with previous 2025-11-uzip campaign.
Abuse categories¶
action-hidden-in-lib-usage
The malicious action is hidden in the code and starts when user interacts with it (e.g. during class initialization or by exfiltrating given credentials).
clones_real_package
The package is a clone of a legitimate package or library, but with malicious code added.
covering-tracks
The package contains code to cover its tracks, e.g. by deleting malicious code after execution.
exfiltration_credentials
The package attempts to steal credentials, like passwords or API keys.
infostealer
Activity is typical for information stealers, i.e. by exfiltrate various sensitive data from the victim's environment.
remote_script
Downloads and executes a remote malicious script.
target:telegram
Campaign uses target:telegram.
typosquatting
The package name is an typosquatting variant of a popular package.
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
-
hxxp://87.120.107.132:3301/reactor -
87.120.107.132 -
hxxp://87.120.107.132:1488/drill -
hxxp://87.120.107.132:1488/drip -
hxxp://87.120.107.132:1488/key