-= Per source details. Do not edit below this line.=-
Importing a module starts downloading and executing an infostealer, widely identified by AV/sandboxes.
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2024-08-embeds-RealtekHDAudioManager
Reasons (based on the campaign):
infostealer
Downloads and executes a remote executable.
{
"malicious-packages-origins": [
{
"modified_time": "2024-10-16T14:50:51Z",
"sha256": "06ce3aa252a736279426dc77cc46d5952970504885521f9f34fadf91d2c54e84",
"source": "reversing-labs",
"versions": [
"0.0.1"
],
"import_time": "2024-10-24T00:57:08.518133936Z",
"id": "RLMA-2024-09218"
},
{
"modified_time": "2024-09-04T21:25:32Z",
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
}
]
}
],
"sha256": "2762e5287209872bdd1b321ade619e939b5356580ccec2946af1655faa9d97b8",
"source": "kam193",
"import_time": "2025-12-02T22:30:55.550025848Z",
"id": "pypi/2024-08-embeds-RealtekHDAudioManager/rodll"
},
{
"modified_time": "2024-09-04T21:25:32Z",
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
}
]
}
],
"sha256": "371166aacf4728718533b433b86908bce1066651f8fb12d3b6a2685612218386",
"source": "kam193",
"import_time": "2025-12-02T23:07:18.590505545Z",
"id": "pypi/2024-08-embeds-RealtekHDAudioManager/rodll"
},
{
"modified_time": "2024-09-04T21:25:32Z",
"sha256": "4628ff911fba13d708c9170682e9b0f3529d2aa184160ae05966dff227bc06e8",
"source": "kam193",
"versions": [
"0.0.1"
],
"import_time": "2025-12-10T21:38:57.796553638Z",
"id": "pypi/2024-08-embeds-RealtekHDAudioManager/rodll"
}
],
"iocs": {
"urls": [
"https://github.com/holdthatcode/host/raw/main/howl.exe",
"https://github.com/holdthatcode/host/raw/main/menu.exe",
"https://raw.githubusercontent.com/bloodstainedvvs/host/main/code.exe",
"https://github.com/bloodstainedvvs/host/raw/main/zwerve.exe",
"https://cdn.discordapp.com/attachments/1276975489780809812/1282787632082059359/zwerve.exe?ex=66e0a094&is=66df4f14&hm=f4604d9783911e770716516e30d4f665214449f46aa2c5a59afc4bda7042bfba&",
"https://github.com/holdthatcode/e/raw/main/code.exe",
"https://github.com/holdthatcode/e/raw/main/zwerve.exe",
"https://github.com/holdthatcode/e/raw/main/CBLines.exe",
"https://github.com/holdthatcode/e/raw/main/Anch.exe"
]
}
}