-= Per source details. Do not edit below this line.=-
During import, the package automatically downloads and executes code that first acts as an infostealer, and then starts code acting as a RAT. It connects with a hardcoded C2 server and waits for commands, supporting e.g. executing remote commands, exfiltrating files, recording the screen, executing GUI actions through PyAutoGUI.
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2026-04-process-support
Reasons (based on the campaign):
exfiltration-generic
The package contains code to execute remote commands (probably limited to a specific set) on the victim's machine.
rat
spyware-like
infostealer
{
"iocs": {
"urls": [
"http://64.49.11.161:8000/share/a29e6d29-d701-482a-abb6-a30216d6b148/",
"http://64.49.11.161:8000/share/543108b4-7da1-423f-924a-c514a590acc3/"
],
"ips": [
"64.49.11.161"
]
},
"malicious-packages-origins": [
{
"source": "kam193",
"modified_time": "2026-04-28T18:21:56.542524Z",
"sha256": "5c59e8650e805678ff4c16929009c0a4f2700174556ff065fa7847ee2822c9bb",
"import_time": "2026-04-28T19:04:25.571560313Z",
"versions": [
"0.1.0"
],
"id": "pypi/2026-04-process-support/timemcp"
}
]
}