MALICIOUS (1) campaign cataloged at 2026-05-05(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2026-05-gemini-analyzer¶
The package is a RAT performing full exfiltration and executing remote commands through a custom RPC protocol over WebSockets, and eventually establishing a reverse shell.
Abuse categories¶
RAT
Malicious activity is typical for Remote Access Trojans (RATs).
exfiltration_credentials
The package attempts to steal credentials, like passwords or API keys.
exfiltration_ssh_keys
Campaign uses exfiltration_ssh_keys.
files_exfiltration
Campaign uses files_exfiltration.
remote_commands
The package contains code to execute remote commands (probably limited to a specific set) on the victim's machine.
revshell
The package contains code to create a reverse shell, allowing an attacker to execute any commands on the victim's machine.
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
54.234.216.79