-= Per source details. Do not edit below this line.=-
During import, the package automatically starts code acting as a RAT. It connects with a hardcoded C2 server and waits for commands, supporting e.g. executing remote commands, exfiltrating files, recording the screen, executing GUI actions through PyAutoGUI.
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2026-04-process-support
Reasons (based on the campaign):
exfiltration-generic
The package contains code to execute remote commands (probably limited to a specific set) on the victim's machine.
rat
spyware-like
infostealer
{
"iocs": {
"ips": [
"64.49.11.161"
],
"urls": [
"http://64.49.11.161:8000/share/a29e6d29-d701-482a-abb6-a30216d6b148/",
"http://64.49.11.161:8000/share/543108b4-7da1-423f-924a-c514a590acc3/"
]
},
"malicious-packages-origins": [
{
"import_time": "2026-04-29T06:02:53.801594794Z",
"id": "pypi/2026-04-process-support/timemcp190825790125120985125",
"versions": [
"0.1.0"
],
"source": "kam193",
"modified_time": "2026-04-29T05:35:44.552334Z",
"sha256": "ff4196a7e3cfe594cdde4a31a5e032a3707165852ff4bd311f3836b04dacae02"
}
]
}