-= Per source details. Do not edit below this line.=-
During import, the code downloads and executes encrypted payload from remote location. During analysis, remote code was prepared to download the next stage executable. This is likely selectively delivered to victims as the code polls the C2 server periodically with the local hostname and awaits the next stage to download.
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2026-04-pathjoin
Reasons (based on the campaign):
obfuscation
Downloads and executes a remote malicious script.
{
"iocs": {
"domains": [
"brainwavehub.org",
"gifpngstore.com"
],
"urls": [
"https://gifpngstore.com/test/dataP.php"
]
},
"malicious-packages-origins": [
{
"source": "kam193",
"modified_time": "2026-04-28T08:25:33.987462Z",
"id": "pypi/2026-04-pathjoin/coloreasyprint",
"sha256": "d52af876a91a6ff5ff8144b705201fd465db94ad89f0e1b37bd22fe6ca0f5622",
"versions": [
"0.4.7.dev1",
"0.4.7.dev2",
"0.4.7.dev3"
],
"import_time": "2026-04-28T09:18:57.566762197Z"
}
]
}