Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Former Defense Contractor Boss Gets 7+ Years for Selling Zero Days

February 25, 2026

CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update

February 25, 2026

44% Surge in App Exploits as AI Speeds Up Cyber-Attacks, IBM Finds

February 25, 2026
Facebook X (Twitter) Instagram
Thursday, February 26
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Fraud Investigation Reveals Sophisticated Python Malware
News

Fraud Investigation Reveals Sophisticated Python Malware

Team-CWDBy Team-CWDFebruary 23, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A sophisticated Python-based malware deployment uncovered during a fraud investigation has revealed a layered attack involving obfuscation, disposable infrastructure and commercial offensive tools.

The discovery was made by the Secuinfra Falcon Team after a user reported unusual desktop behaviour and unauthorised PayPal transfers.

The case began when the victim noticed “strange black windows” appearing briefly on screen and captured screenshots.

Those images showed fragments of a command script that had failed to fully suppress its output, exposing evidence of payload decoding and execution.

Initial Infection and PowerShell Activity

Secuinfra investigated the compromised system. Logs revealed repeated use of PowerShell commands configured to run in hidden mode with execution policy bypassed. One command retrieved a file named “svchoss.exe” from the IP address 43.156.63[.]124 and saved it to a temporary directory, mimicking the legitimate Windows process svchost.exe.

The IP address is associated with Autonomous System 132203, labelled “Tencent Building, Kejizhongyi Avenue” and the infrastructure sits within networks linked to Tencent. Researchers noted that such hosting locations are frequently abused for command-and-control (C2) operations.

Additional downloads included batch and Visual Basic (VB) scripts placed in startup folders to maintain persistence. Memory analysis later confirmed the presence of a concealed Python environment deployed under %LOCALAPPDATA%MicrosoftSystemCache25.

Read more on Python malware techniques: Malicious Machine Learning Model Attack Discovered on PyPI

Memory Forensics, Obfuscation and Credential Theft 

Although disk imaging was not possible, investigators analysed memory dumps using Volatility 3 and string extraction tools. More than 5000 relevant indicators of compromise were identified before filtering. Among them were references to python.exe, xro.py and several encoded binary files.

Further pivoting on the identified IP address uncovered multiple malicious payloads hosted on the same server:

The Cobalt Strike sample was confirmed as a beacon communicating with the same server from which it was downloaded. VirusTotal detections for svchoss.exe reached 41 out of 71 engines as of December 5th 2025.

Analysis of the PyInstaller sample revealed heavy obfuscation. Techniques included falsified Python version metadata, altered magic bytes, misleading filenames and the use of PyArmor. Extracted strings indicated attempts to access Chromium autofill data, cryptocurrency wallets and Mozilla Firefox profiles, suggesting credential theft functionality.

Investigators concluded the system had been fully compromised, though the initial infection vector could not be confirmed. Social engineering, malicious downloads or email-based delivery remain the most likely entry points.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleOutlook Add-Ins Hijack, 0-Day Patches, Wormable Botnet & AI Malware
Next Article How to tell if a voice call is AI or not
Team-CWD
  • Website

Related Posts

News

Former Defense Contractor Boss Gets 7+ Years for Selling Zero Days

February 25, 2026
News

CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update

February 25, 2026
News

44% Surge in App Exploits as AI Speeds Up Cyber-Attacks, IBM Finds

February 25, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

In memoriam: David Harley

November 12, 2025

Is Poshmark safe? How to buy and sell without getting scammed

February 19, 2026

Drowning in spam or scam emails lately? Here’s why

January 27, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.