MALICIOUS (1) campaign cataloged at 2026-05-06(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2026-05-test-py-conn¶
The code automatically starts a worker designed to survive the exit of the main process. The worker load code from a PYC file which then connects to pre-defined C2 server and awaits commands to execute.
Abuse categories¶
RAT
Malicious activity is typical for Remote Access Trojans (RATs).
remote_commands
The package contains code to execute remote commands (probably limited to a specific set) on the victim's machine.
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
-
hxxp://213.136.64.157:5000 -
213.136.64.157 -
hxxp://hello.16fps.in/download/pycache -
hello.16fps.in