Malicious automation/exfiltration script that controls a running Chromium/Kiwi browser via Chrome DevTools Protocol (connects to http://localhost:9222/json and the tab’s webSocketDebuggerUrl) to inject JavaScript for navigation, DOM interaction, cookie manipulation, and page data extraction. It automates Google account sign-in and recovery flows (accounts.google[.]com, mail.google[.]com), including entering credentials/recovery email and attempting password changes, while reporting statuses and (in some branches) passwords to a remote backend via HTTP requests (requests.patch/requests.post) using an externally-defined server base URL (imported as link_sms).
Data theft/exfiltration: on Android, it runs adb commands and uses root (su -c) to copy the browser profile directory /data/user/0/com.kiwibrowser.browser/app_chrome to /sdcard/, zips the collected profile, and uploads the ZIP to the remote server (link_sms/.../upload/...). This directory likely contains cookies/session tokens and other sensitive browser data.
Remote code execution/stager: the embedded JS payload under key 'si' includes a command string that retrieves code from https://runcode-d24f5-default-rtdb.firebaseio[.]com/run[.]json, writes it to code.py, and runs "python3 code.py" (download-and-execute behavior).
Overall severity is high: combines device/browser control (adb, DevTools websocket), credential/account takeover automation, sensitive profile theft, external exfiltration, and a remote code download/execute mechanism.