-= Per source details. Do not edit below this line.=-
Package contains code to install a backdoor - and additionally to a user-controlled backdoor, it also installs the second, with own C2 server. It's not automatically activated. Once started, it can execute commands from C2 and exfiltrate data.
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2025-06-old-trickery
Reasons (based on the campaign):
backdoor
files-exfiltration
peristence-autorun
Downloads and executes a remote malicious script.
The package contains code to execute remote commands (probably limited to a specific set) on the victim's machine.
{
"iocs": {
"urls": [
"https://github.com/cipher234/socioware/raw/main/config.pyw",
"https://github.com/cipher234/socioware/raw/main/socio_req",
"https://github.com/socioware1/trickery/raw/refs/heads/main/archive/trickery.rar"
]
},
"malicious-packages-origins": [
{
"sha256": "3ad5df28c8d5f5afa377d6b54a7eac1d3110610783c7e62fbd084a0bd49baac5",
"import_time": "2026-05-13T20:11:04.545856048Z",
"modified_time": "2026-05-13T18:41:37.827451Z",
"versions": [
"1.0.0",
"1.0.1"
],
"id": "pypi/2025-06-old-trickery/trickery",
"source": "kam193"
}
]
}