Today > | 7 High | 24 Medium | 8 Low vulnerabilities   -   You can now download lists of IOCs here!

Analyzing Malicious Intent in Python Code: A Case Study

Dec. 24, 2024, 1:17 p.m.

Description

Two malicious packages, Zebo-0.1.0 and Cometlogger-0.1, were identified by an AI-driven OSS malware detection system. These packages contain Python scripts designed for surveillance, data exfiltration, and unauthorized control. Zebo-0.1.0 uses obfuscation techniques, keylogging, screen capturing, and data exfiltration to a remote server. It also implements a persistence mechanism to ensure re-execution upon system startup. Cometlogger-0.1 exhibits webhook manipulation, information theft from various platforms, anti-VM detection, dynamic file modification, and persistence mechanisms. Both packages pose significant security risks, including credential leaks and sensitive information theft. The analysis highlights the importance of cybersecurity awareness and robust defensive measures against such malicious code.

Date

Published: Dec. 24, 2024, 2:29 a.m.

Created: Dec. 24, 2024, 2:29 a.m.

Modified: Dec. 24, 2024, 1:17 p.m.

Indicators

e01c61dc52514b011c83c293cf19092c40cb606a28a87675b4f896be5afebed2

839d0cfcc52a130add70239b943d8c82c4234b064d6f996eeaae142f05cc9e85

4aeb0211bd6d9e7c74c09ac67812465f2a8e90e25fe04b265b7f289deea5db21

Attack Patterns

T1059.006

T1552.001

T1547.001

T1497

T1056.001

T1555

T1113

T1005

T1083

T1027

T1112

T1041

T1078