Skip to content

MALICIOUS (1) package from Python Package Index.

  1. The campaign has clearly malicious intent, like infostealers.

gemini-analyzer

Affected versions: (1) 0.1.0, 1.0.8, 1.0.9

  1. Version numbers are usually added automatically. In most cases, the packages listed here were created only to distribute malicious code.

Campaign data

Campaign information may not always be 100% accurate for every related package.

Campaign description

The package is a RAT performing full exfiltration and executing remote commands through a custom RPC protocol over WebSockets, and eventually establishing a reverse shell.

See more details on the campaign page.

RAT

Malicious activity is typical for Remote Access Trojans (RATs).

exfiltration_credentials

The package attempts to steal credentials, like passwords or API keys.

exfiltration_ssh_keys

Campaign targets exfiltration_ssh_keys.

files_exfiltration

Campaign targets files_exfiltration.

remote_commands

The package contains code to execute remote commands (probably limited to a specific set) on the victim's machine.

revshell

The package contains code to create a reverse shell, allowing an attacker to execute any commands on the victim's machine.

Look up in other services

  1. May not be available. See more in pypi-json-data repository.
  2. Open Source Insights project, provided by Google.
  3. Service from Socket.dev, a cybersecurity company.
  4. Spectra Assure Community, a service from ReversingLabs, a cybersecurity company.
  5. Service from Snyk, a cybersecurity company.