-= Per source details. Do not edit below this line.=-
Inside the library there is a part running code hidden in the attached image, which then exfiltrate user-provided data, downloads and install next stage code, exfiltrate TXT files and finally installs infostealers - Lumma and a custom one. Arround L110
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2024-10-fake-usreagent
Reasons (based on the campaign):
infostealer
files-exfiltration
clipboard-stealing
obfuscation
clones-real-package
action-hidden-in-lib-usage
{
"malicious-packages-origins": [
{
"id": "RLMA-2024-11167",
"modified_time": "2024-12-09T06:51:11Z",
"sha256": "3dff917fd79961422cf908b8866036333bb129d8736685ace963dcd230eda48c",
"versions": [
"1.6.7"
],
"import_time": "2024-12-09T14:38:49.187348715Z",
"source": "reversing-labs"
},
{
"id": "pypi/2024-10-fake-usreagent/sol-regex-gener",
"modified_time": "2024-10-07T22:16:18Z",
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
}
]
}
],
"sha256": "edf16f1829cce516b0cbf7febe26d8c51343e6e067246a11408d01d741e539ed",
"import_time": "2025-12-02T22:30:55.584228767Z",
"source": "kam193"
},
{
"id": "pypi/2024-10-fake-usreagent/sol-regex-gener",
"modified_time": "2024-10-07T22:16:18Z",
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
}
]
}
],
"sha256": "863af188c3f151e9ad44d0ed55e0a5faa7120032979ffcdbc822b6dd488dfc12",
"import_time": "2025-12-02T23:07:18.629693487Z",
"source": "kam193"
},
{
"id": "pypi/2024-10-fake-usreagent/sol-regex-gener",
"modified_time": "2024-10-07T22:16:18Z",
"sha256": "a9c0445c1e5027b1de380ebfe4379e82ebc0d8be6ea7087283d17c4b3399994b",
"versions": [
"1.6.7"
],
"import_time": "2025-12-10T21:38:57.824429884Z",
"source": "kam193"
}
],
"iocs": {
"urls": [
"https://ethscanold.com/ex_ewq1/2e.exe",
"https://ethscanold.com/ex_ewq1/cdr2.exe",
"https://ethscanold.com/r.php"
],
"domains": [
"ethscanold.com",
"crypto-api.net"
]
}
}