-= Per source details. Do not edit below this line.=-
During import, the package automatically starts code acting as a RAT. It connects with a hardcoded C2 server and waits for commands, supporting e.g. executing remote commands, exfiltrating files, recording the screen, executing GUI actions through PyAutoGUI.
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2026-04-process-support
Reasons (based on the campaign):
exfiltration-generic
The package contains code to execute remote commands (probably limited to a specific set) on the victim's machine.
rat
spyware-like
infostealer
{
"iocs": {
"urls": [
"http://64.49.11.161:8000/share/a29e6d29-d701-482a-abb6-a30216d6b148/",
"http://64.49.11.161:8000/share/543108b4-7da1-423f-924a-c514a590acc3/"
],
"ips": [
"64.49.11.161"
]
},
"malicious-packages-origins": [
{
"source": "kam193",
"modified_time": "2026-04-28T21:29:07.275359Z",
"sha256": "ad3ae8b42c6902cd379c732765f0dab1aa53b3aad3b3e97ca6606edb83637ee6",
"import_time": "2026-04-28T21:52:20.62186361Z",
"versions": [
"0.1.0"
],
"id": "pypi/2026-04-process-support/timestamp-py"
}
]
}