-= Per source details. Do not edit below this line.=-
During import, a remote executable is automatically started. During analysis, the executable only showed a basic message. It's likely experimenting with malicious techniques to prepare for real malicious action.
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2026-04-mylib-utils
Reasons (based on the campaign):
Downloads and executes a remote executable.
The package overrides the install command in setup.py to execute malicious code during installation.
1.0.01.0.1Exploitability
AV:NAC:LPR:NUI:NScope
S:CImpact
C:HI:HA:H10.0/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H