The init.py contains a call to execute a Base64-encoded script to download a second stage payload.
-= Per source details. Do not edit below this line.=-
{
"malicious-packages-origins": [
{
"source": "reversing-labs",
"id": "RLMA-2024-11070",
"modified_time": "2024-12-09T06:50:28Z",
"versions": [
"2.5.3",
"2.5.5"
],
"import_time": "2024-12-09T14:38:44.810507884Z",
"sha256": "f0092914933fe4888b5cdc55f1b3235c3e846530444b2606fc0b2262a7aa28e2"
}
]
}