This file first checks for a “--background” flag and, if absent, respawns itself in the background (subprocess.Popen with stdout/stderr/stdin redirected to DEVNULL and close_fds=True) then exits the parent process—implementing a stealthy daemonization. In the background execution path, it holds a large hardcoded _payload (base64-encoded, zlib-compressed). The code decodes and decompresses this blob at runtime and immediately exec()utes it, allowing arbitrary code execution from an obfuscated source. No integrity checks or transparency measures are provided, and the actual payload behavior (network I/O, backdoor, exfiltration, etc.) is hidden. This pattern presents a severe supply-chain risk and should be treated as confirmed malware until the embedded payload is extracted and analyzed in a secure, isolated environment.
Live on pypi for 120 days, 12 hours and 47 minutes before removal. Socket users were protected even while the package was live.