-= Per source details. Do not edit below this line.=-
Continuation of the campaign with a slight different obfuscation of the malicious code, but there seems to be no difference in the behavior. The malicious code is downloaded and executed
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2025-12-graphnode
Reasons (based on the campaign):
obfuscation
Downloads and executes a remote malicious script.
clones-real-package
{
"malicious-packages-origins": [
{
"id": "pypi/2025-12-graphnode/bigpyx",
"import_time": "2025-12-10T09:40:31.18807388Z",
"modified_time": "2025-12-10T08:44:43.53658Z",
"versions": [
"0.0.2",
"0.0.1"
],
"sha256": "7a1bcd636394f1505534cf691576b00e8686aa14474e8a209c94f8213310b128",
"source": "kam193"
}
],
"iocs": {
"domains": [
"aurevian.cloud"
],
"urls": [
"https://raw.githubusercontent.com/oscaratkins831/CrowdFunding-Smart-Contract-main/refs/heads/main/readme.md",
"https://drive.google.com/uc?export=download&id=1JhtoVi6UjdCEa9mT5kHvYxd2UauiccW4",
"https://aurevian.cloud/public/startup.py?ver=1.2",
"https://raw.githubusercontent.com/ronniebrooks/node-javascript-ecommerce-main/refs/heads/main/.gitignore",
"https://raw.githubusercontent.com/ronniebrooks/node-javascript-ecommerce-main/refs/heads/main/package.json",
"https://drive.google.com/uc?export=download&id=1FKQxvZM2zl0pmtf_cIHdjLSVdf-ZlUYR",
"https://drive.google.com/uc?export=download&id=1RPC49CCI9urhfoVdPkO3pCSI4Lr430Lx"
]
}
}