MALICIOUS (1) campaign cataloged at 2026-03-26(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2026-03-pipipipi¶
Clones of legitimate libraries with malicious modifications intended to download malicious remote code. The remote script allows executing arbitrary files through a Telegram as C2 channel.
Abuse categories¶
RAT
Malicious activity is typical for Remote Access Trojans (RATs).
clones_real_package
The package is a clone of a legitimate package or library, but with malicious code added.
remote_script
Downloads and executes a remote malicious script.
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
-
hxxps://tinyurl.com/47h5bmcw -
hxxps://www.dropbox.com/scl/fi/ybqsqvbquwbk9h59aottq/shadowsocksvpn.ps1?rlkey=2huygpgfs1pmasr9h70tr9zti&st=1ghv9gld&dl=1