-= Per source details. Do not edit below this line.=-
During initialization of the archive-support class, the package starts code from another file and downloads multi-stage malware
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2025-11-uzip
Reasons (based on the campaign):
Downloads and executes a remote executable.
obfuscation
malware
{
"iocs": {
"ips": [
"77.105.161.164",
"87.120.107.132"
],
"urls": [
"http://77.105.161.164:3301/library",
"http://77.105.161.164:3301/die1",
"http://87.120.107.132:1488/df"
]
},
"malicious-packages-origins": [
{
"id": "pypi/2025-11-uzip/ziphash",
"source": "kam193",
"sha256": "e9a36a54bad10e0f086740a84fd0a837dd4bf1cc9c3c0707648af4bb3855a03e",
"modified_time": "2026-01-01T22:08:29.251788Z",
"versions": [
"0.1.5"
],
"import_time": "2026-01-01T23:07:30.864548307Z"
},
{
"id": "pypi/2025-11-uzip/ziphash",
"source": "kam193",
"sha256": "de06ccd70fe8b69002b46d408c03d54b67573964d444478357e6a7226b418abf",
"modified_time": "2026-01-02T19:55:15.640066Z",
"versions": [
"0.1.5",
"0.1.6"
],
"import_time": "2026-01-02T20:39:13.21452589Z"
}
]
}