-= Per source details. Do not edit below this line.=-
Importing a module starts downloading and executing an infostealer, widely identified by AV/sandboxes.
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2024-08-embeds-RealtekHDAudioManager
Reasons (based on the campaign):
infostealer
Downloads and executes a remote executable.
{
"malicious-packages-origins": [
{
"modified_time": "2024-12-09T06:50:53Z",
"sha256": "d21600618d4dc4e6de3be78fb8a0692ef975d4abe5769c4de651f3133b9fe48b",
"source": "reversing-labs",
"versions": [
"0.1"
],
"import_time": "2024-12-09T14:38:47.570742281Z",
"id": "RLMA-2024-11128"
},
{
"modified_time": "2024-09-04T21:25:32Z",
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
}
]
}
],
"sha256": "56bdf49b67398e6a91171ba152f3ed8d21f0ef5ce38d09668b37146d8ee7d91f",
"source": "kam193",
"import_time": "2025-12-02T22:30:55.460715584Z",
"id": "pypi/2024-08-embeds-RealtekHDAudioManager/pydeobf"
},
{
"modified_time": "2024-09-04T21:25:32Z",
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
}
]
}
],
"sha256": "232dd49c6b4b7390c7524bcae8aeee62a5d737258e0cff12a8c7f851a2982ac5",
"source": "kam193",
"import_time": "2025-12-02T23:07:18.484773078Z",
"id": "pypi/2024-08-embeds-RealtekHDAudioManager/pydeobf"
},
{
"modified_time": "2024-09-04T21:25:32Z",
"sha256": "6c94ab57d72954d42c1b5085a575bc7f87510aa3bd706b3b12ffb9bd9c1394af",
"source": "kam193",
"versions": [
"0.1"
],
"import_time": "2025-12-10T21:38:57.700161588Z",
"id": "pypi/2024-08-embeds-RealtekHDAudioManager/pydeobf"
}
],
"iocs": {
"urls": [
"https://github.com/holdthatcode/host/raw/main/howl.exe",
"https://github.com/holdthatcode/host/raw/main/menu.exe",
"https://raw.githubusercontent.com/bloodstainedvvs/host/main/code.exe",
"https://github.com/bloodstainedvvs/host/raw/main/zwerve.exe",
"https://cdn.discordapp.com/attachments/1276975489780809812/1282787632082059359/zwerve.exe?ex=66e0a094&is=66df4f14&hm=f4604d9783911e770716516e30d4f665214449f46aa2c5a59afc4bda7042bfba&",
"https://github.com/holdthatcode/e/raw/main/code.exe",
"https://github.com/holdthatcode/e/raw/main/zwerve.exe",
"https://github.com/holdthatcode/e/raw/main/CBLines.exe",
"https://github.com/holdthatcode/e/raw/main/Anch.exe"
]
}
}