MAL-2024-11622

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/larpexodus/MAL-2024-11622.json
JSON Data
https://api.test.osv.dev/v1/vulns/MAL-2024-11622
Published
2024-09-04T21:25:32Z
Modified
2025-12-12T20:42:56.209460Z
Summary
Malicious code in larpexodus (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (5b391a50d47eceb41e0f102a5825b7e68d35a2c950ecc91f32c2b48e890792b9)

Importing a module starts downloading and executing an infostealer, widely identified by AV/sandboxes.


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2024-08-embeds-RealtekHDAudioManager

Reasons (based on the campaign):

  • infostealer

  • Downloads and executes a remote executable.

Database specific
{
    "iocs": {
        "urls": [
            "https://github.com/holdthatcode/host/raw/main/howl.exe",
            "https://github.com/holdthatcode/host/raw/main/menu.exe",
            "https://raw.githubusercontent.com/bloodstainedvvs/host/main/code.exe",
            "https://github.com/bloodstainedvvs/host/raw/main/zwerve.exe",
            "https://cdn.discordapp.com/attachments/1276975489780809812/1282787632082059359/zwerve.exe?ex=66e0a094&is=66df4f14&hm=f4604d9783911e770716516e30d4f665214449f46aa2c5a59afc4bda7042bfba&",
            "https://github.com/holdthatcode/e/raw/main/code.exe",
            "https://github.com/holdthatcode/e/raw/main/zwerve.exe",
            "https://github.com/holdthatcode/e/raw/main/CBLines.exe",
            "https://github.com/holdthatcode/e/raw/main/Anch.exe"
        ]
    },
    "malicious-packages-origins": [
        {
            "modified_time": "2024-12-09T06:50:31Z",
            "id": "RLMA-2024-11076",
            "import_time": "2024-12-09T14:38:45.096856947Z",
            "versions": [
                "0.1"
            ],
            "source": "reversing-labs",
            "sha256": "a3629568af0b8286902a1656f5b51b67f98dccf528db4bbd5a094063f92b774d"
        },
        {
            "modified_time": "2024-09-04T21:25:32Z",
            "id": "pypi/2024-08-embeds-RealtekHDAudioManager/larpexodus",
            "import_time": "2025-12-02T22:30:55.307004472Z",
            "source": "kam193",
            "ranges": [
                {
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ],
                    "type": "ECOSYSTEM"
                }
            ],
            "sha256": "48f436064981bb8dce32933dc73475abf94985a816804b0a4571f0eec1b1219a"
        },
        {
            "modified_time": "2024-09-04T21:25:32Z",
            "id": "pypi/2024-08-embeds-RealtekHDAudioManager/larpexodus",
            "import_time": "2025-12-02T23:07:18.333071023Z",
            "source": "kam193",
            "ranges": [
                {
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ],
                    "type": "ECOSYSTEM"
                }
            ],
            "sha256": "5b391a50d47eceb41e0f102a5825b7e68d35a2c950ecc91f32c2b48e890792b9"
        },
        {
            "modified_time": "2024-09-04T21:25:32Z",
            "id": "pypi/2024-08-embeds-RealtekHDAudioManager/larpexodus",
            "import_time": "2025-12-10T21:38:57.56784967Z",
            "versions": [
                "0.1"
            ],
            "source": "kam193",
            "sha256": "3ee0c42ec3dd141d7ce82ea3e8212e82c03e06599ad69f1547e9df105bc08290"
        }
    ]
}
References
Credits

Affected packages

PyPI / larpexodus

Package

Affected ranges

Affected versions

0.*

0.1

Database specific

source

"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/larpexodus/MAL-2024-11622.json"