-= Per source details. Do not edit below this line.=-
Importing the module (init.py) starts downloading and executing a remote exectuable, which has been identified by any.run and tria.ge as a malicious infostealer
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2025-04-tensorflowlitex
Reasons (based on the campaign):
Downloads and executes a remote executable.
exfiltration-browser-data
infostealer
malware
typosquatting
{
"malicious-packages-origins": [
{
"import_time": "2025-12-02T22:30:55.631390546Z",
"modified_time": "2025-04-25T12:00:27Z",
"sha256": "1f8c546b796531a1fcf06e705691909563fce6128815b2d4a8f9333c1cb967fd",
"source": "kam193",
"ranges": [
{
"events": [
{
"introduced": "0"
}
],
"type": "ECOSYSTEM"
}
],
"id": "pypi/2025-04-tensorflowlitex/tensorflowlitex"
},
{
"import_time": "2025-12-02T23:07:18.67329622Z",
"modified_time": "2025-04-25T12:00:27Z",
"sha256": "c4b20463291f0bcc715ff6daffb6b2cc258096921b2aaf2a0b9bf96947b49b46",
"source": "kam193",
"ranges": [
{
"events": [
{
"introduced": "0"
}
],
"type": "ECOSYSTEM"
}
],
"id": "pypi/2025-04-tensorflowlitex/tensorflowlitex"
},
{
"import_time": "2025-12-10T21:38:57.859800082Z",
"modified_time": "2025-04-25T12:00:27Z",
"sha256": "40762c570ef9125e0eb16acd8ede71c1c50493437fd459ddffd584aab1bcba26",
"source": "kam193",
"versions": [
"0.1.7"
],
"id": "pypi/2025-04-tensorflowlitex/tensorflowlitex"
}
],
"iocs": {
"urls": [
"https://raw.githubusercontent.com/maheswede/min/main/aur.exe",
"https://raw.githubusercontent.com/maheswede/kilo/main/Fwmdlz.mp4"
]
}
}