LIVE NEWS
  • Trinidad and Tobago police uncover 56 bodies, mostly children, at cemetery | Crime News
  • The best TV antennas to buy in 2024
  • Look beyond Trump for the real story on US climate action
  • Obama meets Mamdani in New York City before reading to preschoolers
  • How Trump is pushing psychedelics reform through the health agencies
  • Now is your last chance to grab our EXCLUSIVE Surfshark deal — year-low prices with 4 months extra protection included
  • Middle East crisis live: ships report attacks as Iran closes strait of Hormuz; Trump reportedly convenes Situation Room meeting | US-Israel war on Iran
  • 50,640 People Affected After Hackers Hit Healthcare Firm, Stealing Personal, Financial and Medical Data
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»Fraud Investigation Reveals Sophisticated Python Malware
Cybersecurity

Fraud Investigation Reveals Sophisticated Python Malware

primereportsBy primereportsFebruary 23, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Fraud Investigation Reveals Sophisticated Python Malware
Share
Facebook Twitter LinkedIn Pinterest Email


A sophisticated Python-based malware deployment uncovered during a fraud investigation has revealed a layered attack involving obfuscation, disposable infrastructure and commercial offensive tools.

The discovery was made by the Secuinfra Falcon Team after a user reported unusual desktop behaviour and unauthorised PayPal transfers.

The case began when the victim noticed “strange black windows” appearing briefly on screen and captured screenshots.

Those images showed fragments of a command script that had failed to fully suppress its output, exposing evidence of payload decoding and execution.

Initial Infection and PowerShell Activity

Secuinfra investigated the compromised system. Logs revealed repeated use of PowerShell commands configured to run in hidden mode with execution policy bypassed. One command retrieved a file named “svchoss.exe” from the IP address 43.156.63[.]124 and saved it to a temporary directory, mimicking the legitimate Windows process svchost.exe.

The IP address is associated with Autonomous System 132203, labelled “Tencent Building, Kejizhongyi Avenue” and the infrastructure sits within networks linked to Tencent. Researchers noted that such hosting locations are frequently abused for command-and-control (C2) operations.

Additional downloads included batch and Visual Basic (VB) scripts placed in startup folders to maintain persistence. Memory analysis later confirmed the presence of a concealed Python environment deployed under %LOCALAPPDATA%\Microsoft\SystemCache25.

Read more on Python malware techniques: Malicious Machine Learning Model Attack Discovered on PyPI

Memory Forensics, Obfuscation and Credential Theft 

Although disk imaging was not possible, investigators analysed memory dumps using Volatility 3 and string extraction tools. More than 5000 relevant indicators of compromise were identified before filtering. Among them were references to python.exe, xro.py and several encoded binary files.

Further pivoting on the identified IP address uncovered multiple malicious payloads hosted on the same server:

The Cobalt Strike sample was confirmed as a beacon communicating with the same server from which it was downloaded. VirusTotal detections for svchoss.exe reached 41 out of 71 engines as of December 5th 2025.

Analysis of the PyInstaller sample revealed heavy obfuscation. Techniques included falsified Python version metadata, altered magic bytes, misleading filenames and the use of PyArmor. Extracted strings indicated attempts to access Chromium autofill data, cryptocurrency wallets and Mozilla Firefox profiles, suggesting credential theft functionality.

Investigators concluded the system had been fully compromised, though the initial infection vector could not be confirmed. Social engineering, malicious downloads or email-based delivery remain the most likely entry points.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCisco Doubles Up The Switch Bandwidth To Take On AI Scale Out And Eventually Scale Up
Next Article Troops killed after drug lord ‘El Mencho’ captured
primereports
  • Website

Related Posts

Cybersecurity

[Webinar] Eliminate Ghost Identities Before They Expose Your Enterprise Data

April 18, 2026
Cybersecurity

Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks

April 18, 2026
Cybersecurity

Google wipes out 602 million scam ads with Gemini on duty

April 18, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20258 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20264 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Popular Now
  • Artificial Intelligence
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • Trinidad and Tobago police uncover 56 bodies, mostly children, at cemetery | Crime News
  • The best TV antennas to buy in 2024
  • Look beyond Trump for the real story on US climate action
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.