Multiple levels of decoding and dynamic code execution vulnerabilities indicate malicious intent. Obfuscation and arbitrary code execution are present.
No verification record available.
The package exhibits multiple concerning behaviors. Both index-gckBtVBf.cjs and index-7AaEi15b.mjs files match the multi_decode_3 YARA rule, indicating multiple levels of decoding, which is often used to obfuscate malicious code. Additionally, the LLM-based file evaluation service identifies dynamic code execution vulnerabilities in index-gckBtVBf.cjs, specifically within the getReplacement function. This function allows arbitrary code execution based on potentially untrusted input, a significant security risk. The combination of obfuscation and dynamic code execution strongly suggests malicious intent.