MAL-2024-10157

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/rodll/MAL-2024-10157.json
JSON Data
https://api.test.osv.dev/v1/vulns/MAL-2024-10157
Published
2024-09-04T21:25:32Z
Modified
2025-12-12T20:46:06.478566Z
Summary
Malicious code in rodll (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (371166aacf4728718533b433b86908bce1066651f8fb12d3b6a2685612218386)

Importing a module starts downloading and executing an infostealer, widely identified by AV/sandboxes.


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2024-08-embeds-RealtekHDAudioManager

Reasons (based on the campaign):

  • infostealer

  • Downloads and executes a remote executable.

Database specific
{
    "malicious-packages-origins": [
        {
            "modified_time": "2024-10-16T14:50:51Z",
            "sha256": "06ce3aa252a736279426dc77cc46d5952970504885521f9f34fadf91d2c54e84",
            "source": "reversing-labs",
            "versions": [
                "0.0.1"
            ],
            "import_time": "2024-10-24T00:57:08.518133936Z",
            "id": "RLMA-2024-09218"
        },
        {
            "modified_time": "2024-09-04T21:25:32Z",
            "ranges": [
                {
                    "type": "ECOSYSTEM",
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ]
                }
            ],
            "sha256": "2762e5287209872bdd1b321ade619e939b5356580ccec2946af1655faa9d97b8",
            "source": "kam193",
            "import_time": "2025-12-02T22:30:55.550025848Z",
            "id": "pypi/2024-08-embeds-RealtekHDAudioManager/rodll"
        },
        {
            "modified_time": "2024-09-04T21:25:32Z",
            "ranges": [
                {
                    "type": "ECOSYSTEM",
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ]
                }
            ],
            "sha256": "371166aacf4728718533b433b86908bce1066651f8fb12d3b6a2685612218386",
            "source": "kam193",
            "import_time": "2025-12-02T23:07:18.590505545Z",
            "id": "pypi/2024-08-embeds-RealtekHDAudioManager/rodll"
        },
        {
            "modified_time": "2024-09-04T21:25:32Z",
            "sha256": "4628ff911fba13d708c9170682e9b0f3529d2aa184160ae05966dff227bc06e8",
            "source": "kam193",
            "versions": [
                "0.0.1"
            ],
            "import_time": "2025-12-10T21:38:57.796553638Z",
            "id": "pypi/2024-08-embeds-RealtekHDAudioManager/rodll"
        }
    ],
    "iocs": {
        "urls": [
            "https://github.com/holdthatcode/host/raw/main/howl.exe",
            "https://github.com/holdthatcode/host/raw/main/menu.exe",
            "https://raw.githubusercontent.com/bloodstainedvvs/host/main/code.exe",
            "https://github.com/bloodstainedvvs/host/raw/main/zwerve.exe",
            "https://cdn.discordapp.com/attachments/1276975489780809812/1282787632082059359/zwerve.exe?ex=66e0a094&is=66df4f14&hm=f4604d9783911e770716516e30d4f665214449f46aa2c5a59afc4bda7042bfba&",
            "https://github.com/holdthatcode/e/raw/main/code.exe",
            "https://github.com/holdthatcode/e/raw/main/zwerve.exe",
            "https://github.com/holdthatcode/e/raw/main/CBLines.exe",
            "https://github.com/holdthatcode/e/raw/main/Anch.exe"
        ]
    }
}
References
Credits

Affected packages

PyPI / rodll

Package

Affected ranges

Affected versions

0.*

0.0.1

Database specific

source

"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/rodll/MAL-2024-10157.json"