-= Per source details. Do not edit below this line.=-
When imported, the code embedded into the exception class downloads a remote file, and runs it by importing, and attempts to cover tracks by overwriting itself, removing caches and other related files.
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2025-03-tonetext
Reasons (based on the campaign):
Downloads and executes a remote malicious script.
obfuscation
{
"malicious-packages-origins": [
{
"import_time": "2025-12-02T22:30:55.654259882Z",
"modified_time": "2025-03-12T22:30:33Z",
"sha256": "6bdd482d6ab1a67e92e07cfac1da64aa0d02a55c6f019ca1f3fdadc87ecf2e4c",
"source": "kam193",
"ranges": [
{
"events": [
{
"introduced": "0"
}
],
"type": "ECOSYSTEM"
}
],
"id": "pypi/2025-03-tonetext/tonetext"
},
{
"import_time": "2025-12-02T23:07:18.697249404Z",
"modified_time": "2025-03-12T22:30:33Z",
"sha256": "c46725ad6c88079cce4f7fa4a29175fec7f78ea83344da99d0f02ac4f020fcf3",
"source": "kam193",
"ranges": [
{
"events": [
{
"introduced": "0"
}
],
"type": "ECOSYSTEM"
}
],
"id": "pypi/2025-03-tonetext/tonetext"
},
{
"import_time": "2025-12-10T21:38:57.882722152Z",
"modified_time": "2025-03-12T22:30:33Z",
"sha256": "59e36377e7671291e506fade84e8d65b72afebad7c5e5fca51c5111ec9afe2ca",
"source": "kam193",
"versions": [
"0.1.1",
"0.2.1"
],
"id": "pypi/2025-03-tonetext/tonetext"
}
],
"iocs": {
"urls": [
"https://tinyurl.com/ttxP1107"
]
}
}