-= Per source details. Do not edit below this line.=-
If the method from the module is called, it attempts to download a malicious code (identified as msf payload) and save it locally. In the analysed version, the code starting the malicious code was commented out.
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2025-07-web3dummycti
Reasons (based on the campaign):
The package contains code to create a reverse shell, allowing an attacker to execute any commands on the victim's machine.
action-hidden-in-lib-usage
Downloads and executes a remote malicious script.
{
"iocs": {
"urls": [
"https://github.com/brojafox/hehe/raw/refs/heads/main/hehe.txt"
]
},
"malicious-packages-origins": [
{
"sha256": "2ce645d75544487ba7683025086854e1bdb29b598cb662529dde8e7777a15510",
"id": "pypi/2025-07-web3dummycti/web3dummycti",
"modified_time": "2025-08-02T13:52:41.028842Z",
"import_time": "2025-12-02T22:30:55.749371906Z",
"ranges": [
{
"events": [
{
"introduced": "0"
}
],
"type": "ECOSYSTEM"
}
],
"source": "kam193"
},
{
"sha256": "9a702a53b1f08d4ee8e06e9dc19f6c942ee7bd755274f898a2ff737796557316",
"id": "pypi/2025-07-web3dummycti/web3dummycti",
"modified_time": "2025-08-02T13:52:41.028842Z",
"import_time": "2025-12-02T23:07:18.791714449Z",
"ranges": [
{
"events": [
{
"introduced": "0"
}
],
"type": "ECOSYSTEM"
}
],
"source": "kam193"
},
{
"sha256": "9586a86d70ea43ad17d9e58d3e35fb0b7b74791461a20e16fcafea2d66d2cd45",
"id": "pypi/2025-07-web3dummycti/web3dummycti",
"versions": [
"0.1.0"
],
"import_time": "2025-12-10T21:38:57.959047803Z",
"modified_time": "2025-08-02T13:52:41.028842Z",
"source": "kam193"
}
]
}