LIVE NEWS
  • Calls for Global Digital Estate Standard as Fraud Risk Grows
  • An ode to craftsmanship in software development
  • Global economy must stop pandering to ‘frivolous desires of ultra-rich’, says UN expert | Environment
  • Some Middle East Flights Resume but Confusion Reigns From Iran Strikes
  • Clinton Deposition Videos Released in Epstein Investigation
  • Elevance stock tumbles as CMS may halt Medicare enrollment
  • Wild spaces for butterflies to be created in Glasgow
  • You can now adjust how your caller card looks for calls on Android phones
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»Fraud Investigation Reveals Sophisticated Python Malware
Cybersecurity

Fraud Investigation Reveals Sophisticated Python Malware

primereportsBy primereportsFebruary 23, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Fraud Investigation Reveals Sophisticated Python Malware
Share
Facebook Twitter LinkedIn Pinterest Email


A sophisticated Python-based malware deployment uncovered during a fraud investigation has revealed a layered attack involving obfuscation, disposable infrastructure and commercial offensive tools.

The discovery was made by the Secuinfra Falcon Team after a user reported unusual desktop behaviour and unauthorised PayPal transfers.

The case began when the victim noticed “strange black windows” appearing briefly on screen and captured screenshots.

Those images showed fragments of a command script that had failed to fully suppress its output, exposing evidence of payload decoding and execution.

Initial Infection and PowerShell Activity

Secuinfra investigated the compromised system. Logs revealed repeated use of PowerShell commands configured to run in hidden mode with execution policy bypassed. One command retrieved a file named “svchoss.exe” from the IP address 43.156.63[.]124 and saved it to a temporary directory, mimicking the legitimate Windows process svchost.exe.

The IP address is associated with Autonomous System 132203, labelled “Tencent Building, Kejizhongyi Avenue” and the infrastructure sits within networks linked to Tencent. Researchers noted that such hosting locations are frequently abused for command-and-control (C2) operations.

Additional downloads included batch and Visual Basic (VB) scripts placed in startup folders to maintain persistence. Memory analysis later confirmed the presence of a concealed Python environment deployed under %LOCALAPPDATA%\Microsoft\SystemCache25.

Read more on Python malware techniques: Malicious Machine Learning Model Attack Discovered on PyPI

Memory Forensics, Obfuscation and Credential Theft 

Although disk imaging was not possible, investigators analysed memory dumps using Volatility 3 and string extraction tools. More than 5000 relevant indicators of compromise were identified before filtering. Among them were references to python.exe, xro.py and several encoded binary files.

Further pivoting on the identified IP address uncovered multiple malicious payloads hosted on the same server:

The Cobalt Strike sample was confirmed as a beacon communicating with the same server from which it was downloaded. VirusTotal detections for svchoss.exe reached 41 out of 71 engines as of December 5th 2025.

Analysis of the PyInstaller sample revealed heavy obfuscation. Techniques included falsified Python version metadata, altered magic bytes, misleading filenames and the use of PyArmor. Extracted strings indicated attempts to access Chromium autofill data, cryptocurrency wallets and Mozilla Firefox profiles, suggesting credential theft functionality.

Investigators concluded the system had been fully compromised, though the initial infection vector could not be confirmed. Social engineering, malicious downloads or email-based delivery remain the most likely entry points.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCisco Doubles Up The Switch Bandwidth To Take On AI Scale Out And Eventually Scale Up
Next Article Troops killed after drug lord ‘El Mencho’ captured
primereports
  • Website

Related Posts

Cybersecurity

Calls for Global Digital Estate Standard as Fraud Risk Grows

March 4, 2026
Cybersecurity

Samsung Unpacked 2026 live blog: Updates on Galaxy S26 Ultra, preorder deals, and pricing

February 25, 2026
Cybersecurity

Marquis sues SonicWall over backup breach that led to ransomware attack

February 25, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20255 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20264 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Artificial Intelligence
  • Popular Now
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • Calls for Global Digital Estate Standard as Fraud Risk Grows
  • An ode to craftsmanship in software development
  • Global economy must stop pandering to ‘frivolous desires of ultra-rich’, says UN expert | Environment
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.