-= Per source details. Do not edit below this line.=-
It appears to be a forgotten pentest checking typosquatting against cobo-custody package, but may also have malicious purposes. During installation, if a machine is Mac, an obfuscated code attempts to download and execute a shell script. Currently, the server does not respond.
Category: PROBABLY_PENTEST - Packages looking like typical pentest packages, but also anything that looks like testing, exploring pre-prepared kits, research & co, with clearly low-harm possibilities.
Campaign: 2024-08-old-cobo-sectest
Reasons (based on the campaign):
Downloads and executes a remote executable.
clones-real-package
crypto-related
The package overrides the install command in setup.py to execute malicious code during installation.
obfuscation
typosquatting
{
"iocs": {
"urls": [
"http://114.132.245.217:40081"
]
},
"malicious-packages-origins": [
{
"source": "kam193",
"id": "pypi/2024-08-old-cobo-sectest/cobo-custdy",
"modified_time": "2024-09-07T21:45:29Z",
"sha256": "58ed63a140469c371d91c33972db5fc9a754b8557dd979ed32a8ee960d2ad10c",
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
}
]
}
],
"import_time": "2025-12-02T22:30:55.950276832Z"
},
{
"source": "kam193",
"id": "pypi/2024-08-old-cobo-sectest/cobo-custdy",
"modified_time": "2024-09-07T21:45:29Z",
"sha256": "cd0d754c7d09b395a490411bfdba9006309e5227c634e9946f4612de907de0d0",
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
}
]
}
],
"import_time": "2025-12-02T23:07:19.140398925Z"
},
{
"source": "kam193",
"id": "pypi/2024-08-old-cobo-sectest/cobo-custdy",
"modified_time": "2024-09-07T21:45:29Z",
"sha256": "6b9bf08d855d4ff8a72c16a8bd8e55a5e2f20a7f42c514ed484e6c997102630a",
"versions": [
"0.1"
],
"import_time": "2025-12-10T21:38:58.278520395Z"
}
]
}