{"id":"MAL-2024-10111","summary":"Malicious code in pyadd (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (67e5e3d0aff485ca2bf6f83151e1ecfae4a9b9335db657c72142ac9fd034250e)\nImporting a module starts downloading and executing an infostealer, widely identified by AV/sandboxes.\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2024-08-embeds-RealtekHDAudioManager\n\n\nReasons (based on the campaign):\n\n\n - infostealer\n\n\n - Downloads and executes a remote executable.\n","modified":"2026-03-19T12:55:31.567730Z","published":"2024-09-04T21:25:32Z","database_specific":{"malicious-packages-origins":[{"sha256":"9cb98ba09efcb0966c2a890f45003b093ff42dda2b702d0128002938d8573871","source":"reversing-labs","id":"RLMA-2024-08857","versions":["0.1.0","0.1.1","0.1.2","0.1.3","0.1.4"],"modified_time":"2024-10-16T14:47:10Z","import_time":"2024-10-24T00:57:05.165231074Z"},{"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"source":"kam193","id":"pypi/2024-08-embeds-RealtekHDAudioManager/pyadd","sha256":"c3722fbc2357f3298b71197d7521a983ac79a6210826a38f9bb258e5e02c886c","modified_time":"2024-09-04T21:25:32Z","import_time":"2025-12-02T22:30:55.453298763Z"},{"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"source":"kam193","id":"pypi/2024-08-embeds-RealtekHDAudioManager/pyadd","sha256":"67e5e3d0aff485ca2bf6f83151e1ecfae4a9b9335db657c72142ac9fd034250e","modified_time":"2024-09-04T21:25:32Z","import_time":"2025-12-02T23:07:18.476684426Z"},{"sha256":"c7b789bf3c19ef3910cef02169c949a2e0a328e5449277113243449ec9a560a1","source":"kam193","id":"pypi/2024-08-embeds-RealtekHDAudioManager/pyadd","versions":["0.1.0","0.1.1","0.1.2","0.1.3","0.1.4"],"modified_time":"2024-09-04T21:25:32Z","import_time":"2025-12-10T21:38:57.693116947Z"},{"sha256":"0925d447664fa88cf72383de0042014983d6526e85bb7a95e9c40f0fe45c8b5d","source":"reversing-labs","id":"RLUA-2026-00620","modified_time":"2026-03-18T12:17:17Z","import_time":"2026-03-19T12:20:14.434590425Z"}],"iocs":{"urls":["https://github.com/holdthatcode/host/raw/main/howl.exe","https://github.com/holdthatcode/host/raw/main/menu.exe","https://raw.githubusercontent.com/bloodstainedvvs/host/main/code.exe","https://github.com/bloodstainedvvs/host/raw/main/zwerve.exe","https://cdn.discordapp.com/attachments/1276975489780809812/1282787632082059359/zwerve.exe?ex=66e0a094&is=66df4f14&hm=f4604d9783911e770716516e30d4f665214449f46aa2c5a59afc4bda7042bfba&","https://github.com/holdthatcode/e/raw/main/code.exe","https://github.com/holdthatcode/e/raw/main/zwerve.exe","https://github.com/holdthatcode/e/raw/main/CBLines.exe","https://github.com/holdthatcode/e/raw/main/Anch.exe"]}},"references":[{"type":"EVIDENCE","url":"https://www.virustotal.com/gui/file/249c91245c949e8e7cc7f4bd3d6aef9b354c1d249fc3097b0363862ed7269886"},{"type":"EVIDENCE","url":"https://tria.ge/240904-zj4b6awckl/behavioral1"},{"type":"EVIDENCE","url":"https://www.virustotal.com/gui/file/62a7ed6c03d5e519cc5121fe8ad967bdadbbda106a3250b03ab50fb10457ed37"},{"type":"EVIDENCE","url":"https://tria.ge/240913-pcqgls1cna"},{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/pyadd"}],"affected":[{"package":{"name":"pyadd","ecosystem":"PyPI","purl":"pkg:pypi/pyadd"},"versions":["0.1.0","0.1.1","0.1.2","0.1.3","0.1.4"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/pyadd/MAL-2024-10111.json"}}],"schema_version":"1.7.5","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"]},{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"ANALYST"},{"name":"ReversingLabs","contact":["https://www.reversinglabs.com"],"type":"FINDER"}]}