-= Per source details. Do not edit below this line.=-
During installation, the obfuscated code is run and connect with a remote server. In the current version, the code just opens a URL without exfiltrating any data. However, the high obfuscation level, including using an IP as the encryption key, makes the intentions unclear
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2025-10-python3-6
Reasons (based on the campaign):
obfuscation
other
{
"iocs": {
"domains": [
"romsbamgel470.giize.com"
],
"ips": [
"144.172.116.56"
]
},
"malicious-packages-origins": [
{
"id": "pypi/2025-10-python3-6/python3-6",
"sha256": "f0403d13a382541954140edda4f3e859118e2ef2051dce6f9474bd0b2d4e5899",
"source": "kam193",
"versions": [
"0.3.0",
"0.2.0",
"0.1.0"
],
"modified_time": "2025-10-10T16:27:54.946379Z",
"import_time": "2025-12-02T22:30:55.495388578Z"
},
{
"id": "pypi/2025-10-python3-6/python3-6",
"sha256": "d48e27507362baa15b8e41d1554bce82077fcc870112ab6cb4d17694b47c8ef3",
"source": "kam193",
"versions": [
"0.3.0",
"0.2.0",
"0.1.0"
],
"modified_time": "2025-10-10T16:27:54.946379Z",
"import_time": "2025-12-02T23:07:18.520187693Z"
},
{
"id": "pypi/2025-10-python3-6/python3-6",
"sha256": "419f7565a54a5a113d57ec017de6b78e9e38b82aa60a88f161be657eb2d273d4",
"source": "kam193",
"versions": [
"0.1.0",
"0.2.0",
"0.3.0"
],
"modified_time": "2025-10-10T16:27:54.946379Z",
"import_time": "2025-12-30T22:39:04.148526267Z"
}
]
}