-= Per source details. Do not edit below this line.=-
The code automatically starts a worker designed to survive the exit of the main process. The worker load code from a PYC file which then connects to pre-defined C2 server and awaits commands to execute.
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2026-05-test-py-conn
Reasons (based on the campaign):
The package contains code to execute remote commands (probably limited to a specific set) on the victim's machine.
rat
0.0.10.0.2Exploitability
AV:NAC:LPR:NUI:NScope
S:CImpact
C:HI:HA:H10.0/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H