MAL-2024-10043

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/mecit2/MAL-2024-10043.json
JSON Data
https://api.test.osv.dev/v1/vulns/MAL-2024-10043
Published
2024-08-05T22:25:51Z
Modified
2025-12-12T20:45:08.062836Z
Summary
Malicious code in mecit2 (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (c9131eebc14bbebfb234f0f0c49ca47882df2140d1061d201735c360b866a867)

Package uses the template from https://github.com/thegoodhackertv/malpip to explore building malicious PyPI packages.


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: SCRIPT_KIDDIE-thegoodhacker-paquete

Reasons (based on the campaign):

  • The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.

  • The package overrides the install command in setup.py to execute malicious code during installation.

  • Package uses simple pre-prepared tools to create a low-quality malicious action.

Database specific
{
    "iocs": {
        "urls": [
            "https://github.com/thegoodhackertv/malpip"
        ]
    },
    "malicious-packages-origins": [
        {
            "source": "reversing-labs",
            "id": "RLMA-2024-08507",
            "sha256": "0366a82bd80ebd496fca0e33a2b31bd4adfd786eea8d2a90962c8f655d18300d",
            "versions": [
                "1.0.0"
            ],
            "import_time": "2024-10-24T00:57:00.535605677Z",
            "modified_time": "2024-10-16T14:43:36Z"
        },
        {
            "ranges": [
                {
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ],
                    "type": "ECOSYSTEM"
                }
            ],
            "id": "pypi/SCRIPT_KIDDIE-thegoodhacker-paquete/mecit2",
            "source": "kam193",
            "sha256": "8056748921e3bcfb0c80aaec2349f146f5d63dea84ebe61b58fc1d38d0f3e542",
            "import_time": "2025-12-02T22:30:55.331437023Z",
            "modified_time": "2024-08-05T22:25:51Z"
        },
        {
            "ranges": [
                {
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ],
                    "type": "ECOSYSTEM"
                }
            ],
            "id": "pypi/SCRIPT_KIDDIE-thegoodhacker-paquete/mecit2",
            "source": "kam193",
            "sha256": "c9131eebc14bbebfb234f0f0c49ca47882df2140d1061d201735c360b866a867",
            "import_time": "2025-12-02T23:07:18.359770153Z",
            "modified_time": "2024-08-05T22:25:51Z"
        },
        {
            "source": "kam193",
            "id": "pypi/SCRIPT_KIDDIE-thegoodhacker-paquete/mecit2",
            "sha256": "16c4ef9a1a1d895fc26fca8dd9dd3b37b3fc16c8f8c0fdb2055c2b45a8573cd3",
            "versions": [
                "1.0.0"
            ],
            "import_time": "2025-12-10T21:38:57.589203446Z",
            "modified_time": "2024-08-05T22:25:51Z"
        }
    ]
}
References
Credits

Affected packages

PyPI / mecit2

Package

Affected ranges

Affected versions

1.*

1.0.0

Database specific

source

"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/mecit2/MAL-2024-10043.json"