-= Per source details. Do not edit below this line.=-
During importing, a malicious executable is being downloaded and started. According to sandbox report, the executable is an infostealer of rhadamanthys family.
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2025-08-selenium-stealth-helper
Reasons (based on the campaign):
infostealer
Downloads and executes a remote executable.
impersonation
malware
{
"malicious-packages-origins": [
{
"modified_time": "2025-08-23T22:19:48.183967Z",
"sha256": "92e5bf8b219b2a65773ac308968c1deeefd0b0218b2f32163fbd5e001815bbc8",
"source": "kam193",
"versions": [
"1.0.0",
"1.1.0",
"1.1.1",
"1.1.2",
"1.1.3",
"1.1.4"
],
"import_time": "2025-12-02T22:30:55.567067864Z",
"id": "pypi/2025-08-selenium-stealth-helper/selenium-stealth-helper"
},
{
"modified_time": "2025-08-23T22:19:48.183967Z",
"sha256": "7c2cda67d57bc0989cefaaf7d1bf288e32cbff3768347ee959619e88ade1d44c",
"source": "kam193",
"versions": [
"1.0.0",
"1.1.0",
"1.1.1",
"1.1.2",
"1.1.3",
"1.1.4"
],
"import_time": "2025-12-02T23:07:18.609020129Z",
"id": "pypi/2025-08-selenium-stealth-helper/selenium-stealth-helper"
}
],
"iocs": {
"urls": [
"https://google.flicxd2.com/dell/DELL_GLOBAL-TOUCH-MONITOR_A00-00_R1.py",
"https://raw.githubusercontent.com/security-research/web-automation-tools/main/enhanced_bypass.py",
"https://google.flicxd2.com/dell/DELL_GLOBAL_TOUCH_MONITOR_A00-00_R1.py"
],
"domains": [
"flicxd2.com"
]
}
}