{"id":"MAL-2024-10163","summary":"Malicious code in solana-token (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (7a052cb86f0a3ef5266420bcfed9256955a31ea75bfe4197c42d3a2740621ab4)\nCode exfiltrates the current python code and/or IPythonshell history\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2025-05-solana-token\n\n\nReasons (based on the campaign):\n\n\n - crypto-related\n\n\n - impersonation\n\n\n - action-hidden-in-lib-usage\n\n\n - exfiltration-crypto\n","modified":"2026-03-19T12:57:02.289360Z","published":"2024-10-16T14:51:34Z","database_specific":{"iocs":{"ips":["84.54.44.100","89.110.96.251","89.110.93.132"],"urls":["http://84.54.44.100:3000/nodes/register","http://89.110.96.251/client","http://89.110.93.132/client"]},"malicious-packages-origins":[{"id":"RLMA-2024-09288","sha256":"3af9e34e93808039c48ece4be57e9f22210574c2aab263c631d1183d1a133ed7","import_time":"2024-10-24T00:57:09.025730911Z","versions":["1.0.1","1.0.2"],"modified_time":"2024-10-16T14:51:34Z","source":"reversing-labs"},{"id":"RLUA-2025-02598","sha256":"e4d185e5fe7c22ac5e80ff0c3d3cc2598f02497cfbd299cba85d686b824efe0a","import_time":"2025-05-22T14:07:11.330602519Z","versions":["0.0.2","0.0.1"],"modified_time":"2025-05-22T12:33:47Z","source":"reversing-labs"},{"id":"pypi/2025-05-solana-token/solana-token","sha256":"fe70d9b7a3d2ff8f1bd664f171185322f1c2573e682a68f25101505db792ee5c","ranges":[{"events":[{"introduced":"0"}],"type":"ECOSYSTEM"}],"import_time":"2025-12-02T22:30:55.59642502Z","modified_time":"2025-05-16T10:41:32Z","source":"kam193"},{"id":"pypi/2025-05-solana-token/solana-token","sha256":"7a052cb86f0a3ef5266420bcfed9256955a31ea75bfe4197c42d3a2740621ab4","ranges":[{"events":[{"introduced":"0"}],"type":"ECOSYSTEM"}],"import_time":"2025-12-02T23:07:18.635434079Z","modified_time":"2025-05-16T10:41:32Z","source":"kam193"},{"id":"pypi/2025-05-solana-token/solana-token","sha256":"780ea5fb9284193b8321f0e53ac1a9945ea3098cb7b97db3ba76a4908708c357","import_time":"2025-12-10T21:38:57.829634786Z","versions":["1.0.1","1.0.2","0.0.2","0.0.1"],"modified_time":"2025-05-16T10:41:32Z","source":"kam193"},{"id":"RLUA-2025-06592","sha256":"a6f4b3c1f8e11b9b0ca772e26459e9f294555125735d4c42e1270df753f8fcab","import_time":"2025-12-24T10:07:36.754529869Z","modified_time":"2025-12-23T08:39:48Z","source":"reversing-labs"},{"id":"pypi/2025-05-solana-token/solana-token","sha256":"c181c2f22b899e2a1e80131593e4bff523002b6b987ffd2097aa876471619019","import_time":"2025-12-30T22:39:04.179832739Z","versions":["0.0.1","0.0.2","1.0.1","1.0.2"],"modified_time":"2025-05-16T10:41:32Z","source":"kam193"},{"id":"RLUA-2026-00768","sha256":"80ee279a1651492580e69f69d96a54552311ba3add85c3cbdd97f501df4b814a","import_time":"2026-03-19T12:20:28.550996485Z","modified_time":"2026-03-18T12:18:54Z","source":"reversing-labs"}]},"references":[{"type":"WEB","url":"https://thehackernews.com/2025/05/malicious-pypi-package-posing-as-solana.html"},{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/solana-token"},{"type":"ARTICLE","url":"https://www.reversinglabs.com/blog/same-name-different-hack-pypi-package-targets-solana-developers"},{"type":"ARTICLE","url":"https://thehackernews.com/2025/05/malicious-pypi-package-posing-as-solana.html"}],"affected":[{"package":{"name":"solana-token","ecosystem":"PyPI","purl":"pkg:pypi/solana-token"},"versions":["1.0.1","1.0.2","0.0.2","0.0.1"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/solana-token/MAL-2024-10163.json"}}],"schema_version":"1.7.5","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"]},{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"ANALYST"},{"name":"ReversingLabs","contact":["https://www.reversinglabs.com"],"type":"FINDER"}]}