-= Per source details. Do not edit below this line.=-
During import, the code download and starts remote executable that later connects to a C2 server, likely establishing a reverse tunnel. After executing the remote binary, the code performs covering-tracks actions by removing the binary from disk, and - depending on version - modifying the package code. The dropper code is either a Python script, or a compiled binary with obfuscated location of the remote binary and config for it.
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2026-03-kube-health-tools
Reasons (based on the campaign):
Downloads and executes a remote executable.
backdoor
obfuscation
covering-tracks
1.0.01.0.11.0.101.0.111.0.121.0.131.0.141.0.21.0.31.0.4+5 moreExploitability
AV:NAC:LPR:NUI:NScope
S:CImpact
C:HI:HA:H10.0/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H