-= Per source details. Do not edit below this line.=-
During import, the package automatically starts code acting as a RAT. It connects with a hardcoded C2 server and waits for commands, supporting e.g. executing remote commands, exfiltrating files, recording the screen, executing GUI actions through PyAutoGUI.
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2026-04-process-support
Reasons (based on the campaign):
The package contains code to execute remote commands (probably limited to a specific set) on the victim's machine.
rat
exfiltration-generic
spyware-like
{
"iocs": {
"ips": [
"64.49.11.161"
]
},
"malicious-packages-origins": [
{
"source": "kam193",
"id": "pypi/2026-04-process-support/process-support",
"modified_time": "2026-04-22T23:13:14.474758Z",
"sha256": "564d7058c3676bb4be00515c1503be2d5239e3c45b301d4e478ee66dc8748c24",
"versions": [
"1.0.0"
],
"import_time": "2026-04-22T23:48:29.418555755Z"
}
]
}