Analyze your own packages withvet GitHub

slf4j-api-js@1.0.0

Possibly Malicious
Analyzed at:4/21/2025, 12:40:33 PM
Source:https://registry.npmjs.org/slf4j-api-js/-/slf4j-api-js-1.0.0.tgz
SHA256:da01976dcd20ad3a0c09516dd2b576eb64e45365bd179b2bc33c2c1484b83dd8
Confidence:Medium
Summary

This analysis was performed using vet and SafeDep Cloud Malicious Package Analysis. Integrate with GitHub using vet-action GitHub Action.

Data exfiltration to a C&C server (8.152.163.60:8058) confirmed by LLM analysis. Missing project info adds to suspicion.

Details

The package slf4j-api-js (1.0.0) is highly suspicious and likely malware due to strong evidence of data exfiltration. Evidence 0, from a reliable LLM-based file analysis service, provides medium confidence that the package's main.js file contains a function (_mcku5ct2) that collects extensive system information (OS, hardware, user details, running processes, etc.) and transmits it to a remote IP address (8.152.163.60:8058). This clearly indicates data exfiltration to a potential command and control (C&C) server. While Evidence 1 highlights the lack of source project information, which is suspicious, the conclusive data exfiltration evidence from the LLM analysis outweighs this uncertainty. The absence of project information could be a deliberate attempt to obfuscate the malicious intent. The combination of these factors strongly suggests malicious behavior.