-= Per source details. Do not edit below this line.=-
Importing a module starts downloading and executing an infostealer, widely identified by AV/sandboxes.
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2024-08-embeds-RealtekHDAudioManager
Reasons (based on the campaign):
infostealer
Downloads and executes a remote executable.
{
"malicious-packages-origins": [
{
"source": "reversing-labs",
"modified_time": "2024-10-16T14:50:51Z",
"import_time": "2024-10-24T00:57:08.574133339Z",
"id": "RLMA-2024-09219",
"versions": [
"0.0.1"
],
"sha256": "426bedb2e74a614889b486cbd97376db0265f39b96400b7d4ba5b02e8af64522"
},
{
"ranges": [
{
"events": [
{
"introduced": "0"
}
],
"type": "ECOSYSTEM"
}
],
"modified_time": "2024-09-04T21:25:32Z",
"source": "kam193",
"import_time": "2025-12-02T22:30:55.550802249Z",
"id": "pypi/2024-08-embeds-RealtekHDAudioManager/roinject",
"sha256": "ebcebeb148509d0345e7030619ab650d2521222a30e3ab010a51cfe877fbe899"
},
{
"ranges": [
{
"events": [
{
"introduced": "0"
}
],
"type": "ECOSYSTEM"
}
],
"modified_time": "2024-09-04T21:25:32Z",
"source": "kam193",
"import_time": "2025-12-02T23:07:18.591884735Z",
"id": "pypi/2024-08-embeds-RealtekHDAudioManager/roinject",
"sha256": "abe077384854dc3572befe16d9f41d68fec2a7dbbc8d38884c526bacf0447318"
},
{
"source": "kam193",
"modified_time": "2024-09-04T21:25:32Z",
"import_time": "2025-12-10T21:38:57.797566766Z",
"id": "pypi/2024-08-embeds-RealtekHDAudioManager/roinject",
"versions": [
"0.0.1"
],
"sha256": "b6f915859eb0a4b87bc6b8067bf8ccbc3598b35aab079067c313b0d47be13581"
}
],
"iocs": {
"urls": [
"https://github.com/holdthatcode/host/raw/main/howl.exe",
"https://github.com/holdthatcode/host/raw/main/menu.exe",
"https://raw.githubusercontent.com/bloodstainedvvs/host/main/code.exe",
"https://github.com/bloodstainedvvs/host/raw/main/zwerve.exe",
"https://cdn.discordapp.com/attachments/1276975489780809812/1282787632082059359/zwerve.exe?ex=66e0a094&is=66df4f14&hm=f4604d9783911e770716516e30d4f665214449f46aa2c5a59afc4bda7042bfba&",
"https://github.com/holdthatcode/e/raw/main/code.exe",
"https://github.com/holdthatcode/e/raw/main/zwerve.exe",
"https://github.com/holdthatcode/e/raw/main/CBLines.exe",
"https://github.com/holdthatcode/e/raw/main/Anch.exe"
]
}
}