MALICIOUS (1) package from Python Package Index.
- The campaign has clearly malicious intent, like infostealers.
code-suggester¶
- Metadata(1) Check in pypi-data project
- Affected versions(2) unspecified
- May not be available. See more in pypi-json-data repository.
- Version numbers are currently not tracked. Assume all versions are affected.
Campaign data¶
Campaign information may not always be 100% accurate for every related package.
Campaign description
During installation, the package collects quite extensive information about the host and has no other purpose. To avoid detection, the real code is put in a ZIP archive and includes also some VM-detection techniques. The malicious code is activated via metaclass set for the "install" command class in setup.py
Over the time, techniques used in packages are slightly changing, including that some of marked packages don't have malicious part, but rather are used only for tests.
See more details on the campaign page.
basic_exfiltration
The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.
exfiltration_env_variables
Campaign targets exfiltration_env_variables.
override_install
The package overrides the install command in setup.py to execute malicious code during installation.
sandbox-detection
The package contains code to detect if it is running in a sandbox environment.