-= Per source details. Do not edit below this line.=-
The package likely tests different malicious techniques and delivering payload in setup.py. Different versions, like 0.1.0, 0.4.0 or 0.9.0 contain malicious payload in setup.py that either run remote script or exfiltrate env variables during installation. The malicious versions are also quickly removed and replaced with versions without malicious code.
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2026-03-just4testlm
Reasons (based on the campaign):
Downloads and executes a remote malicious script.
exfiltration-env-variables
{
"malicious-packages-origins": [
{
"import_time": "2026-04-09T07:42:34.161539179Z",
"modified_time": "2026-04-09T07:28:56.971481Z",
"sha256": "512c9983d4d153d1cf4bae9fffbddc13d5a5f58573dd4ea042dca9e43cac964b",
"source": "kam193",
"versions": [
"0.1.0",
"0.2.0",
"0.3.0",
"0.4.0",
"0.5.0",
"0.6.0",
"0.7.0",
"0.8.0",
"0.9.0",
"0.9.1",
"0.9.2"
],
"id": "pypi/GENERIC-questionable-pentest/just4testlm"
},
{
"import_time": "2026-04-09T08:38:22.247537267Z",
"modified_time": "2026-04-09T08:22:13.143434Z",
"sha256": "5aed012f2ecc4af261bb7f2fc294b9aee5c0733ccf207b9e9e9a381d51387811",
"source": "kam193",
"versions": [
"0.1.0",
"0.2.0",
"0.3.0",
"0.4.0",
"0.5.0",
"0.6.0",
"0.7.0",
"0.8.0",
"0.9.0",
"0.9.1",
"0.9.2",
"0.9.3"
],
"id": "pypi/2026-03-just4testlm/just4testlm"
}
],
"iocs": {
"domains": [
"just4testlm.tos-cn-hongkong.volces.com",
"pipi.8d90982c.cdn.cloudops.ink",
"cloudops.ink"
],
"urls": [
"https://just4testlm.tos-cn-hongkong.volces.com/run.sh"
]
}
}