Malicious Python Package Conceals Golang-based Sliver C2 Framework
See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses
The subterfuge was orchestrated through modifications in the package’s setup.py file, programmed to execute a Base64-encoded command to extract the system’s Universally Unique Identifier (UUID). Intriguingly, the infection process progresses only upon matching a specific identifier, indicating a targeted approach by the package’s creators, potentially signaling either a meticulously planned assault or a prelude to a broader campaign.
Concealing Malware Within Innocuous Images
Upon verification of the UUID, requests-darwin-lite proceeds to access data from a PNG file named “requests-sidebar-large.png,” resembling the legitimate requests package. However, a glaring discrepancy emerges in the file sizes, with the authentic logo weighing in at 300 kB, whereas the compromised version balloons to approximately 17 MB.
Trending: Offensive Security Tool: 403jump
Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]
Source: thehackernews.com