-= Per source details. Do not edit below this line.=-
During initialization of the archive-support class, the package starts code from another file and downloads multi-stage malware
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2025-11-uzip
Reasons (based on the campaign):
Downloads and executes a remote executable.
obfuscation
malware
{
"malicious-packages-origins": [
{
"versions": [
"0.1.5"
],
"source": "kam193",
"import_time": "2026-01-01T23:07:30.864548307Z",
"modified_time": "2026-01-01T22:08:29.251788Z",
"id": "pypi/2025-11-uzip/ziphash",
"sha256": "e9a36a54bad10e0f086740a84fd0a837dd4bf1cc9c3c0707648af4bb3855a03e"
},
{
"versions": [
"0.1.5",
"0.1.6"
],
"source": "kam193",
"import_time": "2026-01-02T20:39:13.21452589Z",
"modified_time": "2026-01-02T19:55:15.640066Z",
"id": "pypi/2025-11-uzip/ziphash",
"sha256": "de06ccd70fe8b69002b46d408c03d54b67573964d444478357e6a7226b418abf"
}
],
"iocs": {
"urls": [
"http://77.105.161.164:3301/library",
"http://77.105.161.164:3301/die1",
"http://87.120.107.132:1488/df"
],
"ips": [
"77.105.161.164",
"87.120.107.132"
]
}
}