{
  "schema": "cremit-ioc/v1",
  "generated_at": "2026-05-20T06:55:58.566Z",
  "package": {
    "ecosystem": "npm",
    "name": "react-dom-helper",
    "version": "1.0.0",
    "publisher": "k4nx9zfp82",
    "sha256": null,
    "tarball_url": null,
    "weekly_downloads": null,
    "description": null,
    "repository_url": null,
    "first_published_at": null
  },
  "classification": {
    "label": "malicious",
    "confidence": 0.95,
    "summary": "Credential read (reads-aws-creds, reads-npmrc) paired with http-to-public-ip destination — classic exfiltration signature.",
    "provider": "fast-track",
    "heuristic_score": 83,
    "disposition": "auto-published"
  },
  "references": {
    "npm_url": "https://www.npmjs.com/package/react-dom-helper/v/1.0.0",
    "pypi_url": null,
    "osv_id": null,
    "osv_url": null,
    "package_page": "https://incidents.cremit.io/packages/npm/react-dom-helper"
  },
  "techniques": [
    {
      "id": "T1033",
      "name": "System Owner/User Discovery",
      "tactic": "Discovery"
    },
    {
      "id": "T1071.001",
      "name": "Application Layer Protocol: Web Protocols",
      "tactic": "Command and Control"
    },
    {
      "id": "T1082",
      "name": "System Information Discovery",
      "tactic": "Discovery"
    },
    {
      "id": "T1552.001",
      "name": "Unsecured Credentials: Credentials in Files",
      "tactic": "Credential Access"
    },
    {
      "id": "T1567.002",
      "name": "Exfiltration Over Web Service",
      "tactic": "Exfiltration"
    }
  ],
  "indicators": {
    "network": {
      "urls": [],
      "ipv4": [
        "104.248.94.23"
      ],
      "webhook_bins": [],
      "discord_webhook_ids": [],
      "telegram_bots": [],
      "github_repos": []
    },
    "files": {
      "credential_paths": []
    },
    "deps": {
      "suspicious": []
    },
    "encoded": {
      "base64": []
    },
    "metadata": {
      "heuristic_flags": [
        "install-scripts:preinstall",
        "new-publisher:19d",
        "tiny-tarball:412b",
        "first-version-suspicious-publisher"
      ],
      "static_flags": [
        "reads-aws-creds",
        "reads-npmrc",
        "reads-homedir",
        "http-to-public-ip"
      ],
      "self_described_as": []
    }
  },
  "stix_hints": {
    "indicator_pattern_examples": [
      "[ipv4-addr:value = '104.248.94.23']"
    ],
    "note": "These are STIX 2.1 indicator pattern fragments, not a full bundle. Wrap each in {type:\"indicator\", pattern:..., pattern_type:\"stix\"} and add identity / created_by_ref objects to ingest into a TIP."
  }
}