-= Per source details. Do not edit below this line.=-
File is designed to download, hide under system-like name, and run a remote executable, widely identified as malicious.
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2025-05-pyiniter
Reasons (based on the campaign):
infostealer
Downloads and executes a remote executable.
{
"iocs": {
"urls": [
"https://raw.githubusercontent.com/Sierftgddfgrth/win32dll/main/win32dll.exe"
]
},
"malicious-packages-origins": [
{
"id": "RLMA-2025-03617",
"sha256": "d861b2940416441d955f0078fd9ba3c35223bfce822fc68aea70992eaeff8ef1",
"source": "reversing-labs",
"versions": [
"0.2.1",
"0.2.2",
"0.2.5",
"0.2.6"
],
"modified_time": "2025-07-31T19:15:20Z",
"import_time": "2025-08-01T10:07:11.848733674Z"
},
{
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
}
]
}
],
"id": "pypi/2025-05-pyiniter/initer",
"sha256": "f45885faecd0182d82ca81d8adaf52a442b0f493b06eb7b74e8252ab4f009305",
"source": "kam193",
"modified_time": "2025-05-09T20:14:13Z",
"import_time": "2025-12-02T22:30:55.272800406Z"
},
{
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
}
]
}
],
"id": "pypi/2025-05-pyiniter/initer",
"sha256": "d2aac1e40660cbe4323a93d03087f3b9a2d596a5dcfcf2bae3cb0a2ab37cf646",
"source": "kam193",
"modified_time": "2025-05-09T20:14:13Z",
"import_time": "2025-12-02T23:07:18.296967663Z"
},
{
"id": "pypi/2025-05-pyiniter/initer",
"sha256": "21397f251ca4fbd591f60ad9a363777197cfd0746788a1c23854abbbe948bb6b",
"source": "kam193",
"versions": [
"0.2.1",
"0.2.2",
"0.2.5",
"0.2.6"
],
"modified_time": "2025-05-09T20:14:13Z",
"import_time": "2025-12-10T21:38:57.543740644Z"
},
{
"id": "RLUA-2026-00425",
"sha256": "c8ee98ac9e79a9222adb2248cc6ed6d4c35f32b5ebe9a3a2b9f68a09b8140606",
"source": "reversing-labs",
"modified_time": "2026-03-18T12:15:03Z",
"import_time": "2026-03-19T12:19:54.929393922Z"
}
]
}