-= Per source details. Do not edit below this line.=-
During initialization of the archive-support class, the package starts code from another file and downloads multi-stage malware
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2025-11-uzip
Reasons (based on the campaign):
Downloads and executes a remote executable.
obfuscation
malware
{
"iocs": {
"ips": [
"77.105.161.164"
],
"urls": [
"http://77.105.161.164:3301/library",
"http://77.105.161.164:3301/die1"
]
},
"malicious-packages-origins": [
{
"sha256": "81477965a8a70d1ffef0d388478d3e05ef2eea54ade0a9c00ef923deb41b00cf",
"modified_time": "2025-12-11T15:53:42.930767Z",
"import_time": "2025-12-11T16:10:05.33283388Z",
"source": "kam193",
"versions": [
"0.1.0"
],
"id": "pypi/2025-11-uzip/yzip"
},
{
"sha256": "e1d6b6d65166893740b44fc5d3d3333a9ad2903074ae7620a9b6a61b1c61bdf6",
"modified_time": "2025-12-11T15:53:42.930767Z",
"import_time": "2025-12-11T17:11:15.738530683Z",
"source": "kam193",
"versions": [
"0.1.0"
],
"id": "pypi/2025-11-uzip/yzip"
}
]
}