-= Per source details. Do not edit below this line.=-
During initialization of the archive-support class, the package starts code from another file and downloads multi-stage malware
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2025-11-uzip
Reasons (based on the campaign):
Downloads and executes a remote executable.
obfuscation
malware
{
"iocs": {
"ips": [
"77.105.161.164"
],
"urls": [
"http://77.105.161.164:3301/library",
"http://77.105.161.164:3301/die1"
]
},
"malicious-packages-origins": [
{
"source": "kam193",
"id": "pypi/2025-11-uzip/gxzip",
"import_time": "2025-12-10T23:06:34.215472379Z",
"sha256": "8e0dd8700d5267b8d9bbe270798b11d2250761decf1de89249eab6d90a29080c",
"versions": [
"0.1.0"
],
"modified_time": "2025-12-10T22:53:31.008795Z"
},
{
"source": "kam193",
"id": "pypi/2025-11-uzip/gxzip",
"import_time": "2025-12-11T17:11:15.731753986Z",
"sha256": "5902846f55636040def4b0a9ce433e73d8e2fb554e72ef0755be565b48bb8e82",
"versions": [
"0.1.0"
],
"modified_time": "2025-12-10T22:53:31.008795Z"
}
]
}