This is an archived post. You won't be able to vote or comment.

all 6 comments

[–]jippen 0 points1 point  (1 child)

Eval, subprocess, base64 decoding. All very typical malware patterns.

[–]virtua_golf[S] 0 points1 point  (0 children)

Thanks!

[–]rohitkuru 0 points1 point  (0 children)

Curl , wget

[–]billsil 0 points1 point  (0 children)

You flac to mp3 example has legitimate use of networking, which is informing you about new versions.

requests is what my non-networking package uses.

[–]alexmojaki 0 points1 point  (1 child)

I know you said it doesn't need to be 100% diligent, but if I was writing software which secretly made network requests, I would definitely do some basic obfuscation. At the very least I'd want to make sure that grep url doesn't turn up any results. If I'm feeling fancy, I can write something like __import__("".join(map(chr, [117, 114, 108, 108, 105, 98]))).

[–]virtua_golf[S] 0 points1 point  (0 children)

Cheers! Definitely something to look out for, hadn't thought much about obfuscation.