MALICIOUS (1) package from Python Package Index.
- The campaign has clearly malicious intent, like infostealers.
mainx¶
Affected versions: (1) 0.1, 0.4, 0.5, 0.6, 0.7, 0.8, 0.9, 1.0
- Version numbers are usually added automatically. In most cases, the packages listed here were created only to distribute malicious code.
Campaign data¶
Campaign information may not always be 100% accurate for every related package.
Campaign description
While described as educational package to simulate post-exploitation environment, the malware is active and once started, automatically attempts to exfiltrate sensitive data (credentials, cookies, etc.) and places a Discord implant. The remote target is hard coded in the code.
See more details on the campaign page.
exfiltration_browser_data
Campaign targets exfiltration_browser_data.
exfiltration_credentials
The package attempts to steal credentials, like passwords or API keys.
files_exfiltration
Campaign targets files_exfiltration.
infostealer
Activity is typical for information stealers, i.e. by exfiltrate various sensitive data from the victim's environment.
obfuscation
Code uses obfuscation techniques to hide its true purpose.
peristence_autorun
Campaign targets peristence_autorun.
sandbox-detection
The package contains code to detect if it is running in a sandbox environment.
Look up in other services¶
- Check metadata in pypi-data project (1)
- Search for the package in deps.dev(2)
- Search for the package in socket.dev (3)
- Search for the package in secure.software (4)
- Search for the package in Snyk Advisor (5)
- May not be available. See more in pypi-json-data repository.
- Open Source Insights project, provided by Google.
- Service from Socket.dev, a cybersecurity company.
- Spectra Assure Community, a service from ReversingLabs, a cybersecurity company.
- Service from Snyk, a cybersecurity company.