-= Per source details. Do not edit below this line.=-
During import, the package automatically starts code acting as a RAT. It connects with a hardcoded C2 server and waits for commands, supporting e.g. executing remote commands, exfiltrating files, recording the screen, executing GUI actions through PyAutoGUI.
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2026-04-process-support
Reasons (based on the campaign):
exfiltration-generic
The package contains code to execute remote commands (probably limited to a specific set) on the victim's machine.
rat
spyware-like
infostealer
{
"iocs": {
"urls": [
"http://64.49.11.161:8000/share/a29e6d29-d701-482a-abb6-a30216d6b148/",
"http://64.49.11.161:8000/share/543108b4-7da1-423f-924a-c514a590acc3/"
],
"ips": [
"64.49.11.161"
]
},
"malicious-packages-origins": [
{
"modified_time": "2026-04-29T05:37:02.697952Z",
"import_time": "2026-04-29T06:02:53.800775648Z",
"id": "pypi/2026-04-process-support/timemcp-utils",
"source": "kam193",
"sha256": "a5be236e0e188b4d5124010230b31873448caf3f10d8b1c6927d787bcc7f2b3b",
"versions": [
"0.1.0"
]
}
]
}