MAL-2024-11709

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/sol-regex-gener/MAL-2024-11709.json
JSON Data
https://api.test.osv.dev/v1/vulns/MAL-2024-11709
Published
2024-10-07T22:16:18Z
Modified
2025-12-12T20:48:38.581550Z
Summary
Malicious code in sol-regex-gener (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (863af188c3f151e9ad44d0ed55e0a5faa7120032979ffcdbc822b6dd488dfc12)

Inside the library there is a part running code hidden in the attached image, which then exfiltrate user-provided data, downloads and install next stage code, exfiltrate TXT files and finally installs infostealers - Lumma and a custom one. Arround L110


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2024-10-fake-usreagent

Reasons (based on the campaign):

  • infostealer

  • files-exfiltration

  • clipboard-stealing

  • obfuscation

  • clones-real-package

  • action-hidden-in-lib-usage

Database specific
{
    "malicious-packages-origins": [
        {
            "id": "RLMA-2024-11167",
            "modified_time": "2024-12-09T06:51:11Z",
            "sha256": "3dff917fd79961422cf908b8866036333bb129d8736685ace963dcd230eda48c",
            "versions": [
                "1.6.7"
            ],
            "import_time": "2024-12-09T14:38:49.187348715Z",
            "source": "reversing-labs"
        },
        {
            "id": "pypi/2024-10-fake-usreagent/sol-regex-gener",
            "modified_time": "2024-10-07T22:16:18Z",
            "ranges": [
                {
                    "type": "ECOSYSTEM",
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ]
                }
            ],
            "sha256": "edf16f1829cce516b0cbf7febe26d8c51343e6e067246a11408d01d741e539ed",
            "import_time": "2025-12-02T22:30:55.584228767Z",
            "source": "kam193"
        },
        {
            "id": "pypi/2024-10-fake-usreagent/sol-regex-gener",
            "modified_time": "2024-10-07T22:16:18Z",
            "ranges": [
                {
                    "type": "ECOSYSTEM",
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ]
                }
            ],
            "sha256": "863af188c3f151e9ad44d0ed55e0a5faa7120032979ffcdbc822b6dd488dfc12",
            "import_time": "2025-12-02T23:07:18.629693487Z",
            "source": "kam193"
        },
        {
            "id": "pypi/2024-10-fake-usreagent/sol-regex-gener",
            "modified_time": "2024-10-07T22:16:18Z",
            "sha256": "a9c0445c1e5027b1de380ebfe4379e82ebc0d8be6ea7087283d17c4b3399994b",
            "versions": [
                "1.6.7"
            ],
            "import_time": "2025-12-10T21:38:57.824429884Z",
            "source": "kam193"
        }
    ],
    "iocs": {
        "urls": [
            "https://ethscanold.com/ex_ewq1/2e.exe",
            "https://ethscanold.com/ex_ewq1/cdr2.exe",
            "https://ethscanold.com/r.php"
        ],
        "domains": [
            "ethscanold.com",
            "crypto-api.net"
        ]
    }
}
References
Credits

Affected packages

PyPI / sol-regex-gener

Package

Affected ranges

Affected versions

1.*

1.6.7

Database specific

source

"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/sol-regex-gener/MAL-2024-11709.json"