{"id":"MAL-2024-12296","summary":"Malicious code in jupphelp (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (dcda51f3ac0b82ef824630ce053d4dc42aa2021baf16e476ca83ef8d7f7c1cab)\nOnce run, downloads and install from sleipnirbrowser[.]org a suspicious executable pretending to be a webbrowser. This website appears to be a scam using some kind of crypto tokens, and trying to impersonate a legitimate Slepnir web browser (https://en.wikipedia.org/wiki/Sleipnir_(web_browser)). \n\nLater versions switched to install a software identified as LUMMA infostealer (e.g. https://tria.ge/240817-whze2aydkc), hidden in different executables\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2024-08-sleipnirbrowser-web3\n\n\nReasons (based on the campaign):\n\n\n - Downloads and executes a remote executable.\n\n\n - dependency-confusion\n\n\n - crypto-related\n\n\n - modify-system-without-consent\n\n\n - impersonation\n","modified":"2025-12-12T20:38:05.903210Z","published":"2024-08-10T16:25:59Z","database_specific":{"malicious-packages-origins":[{"import_time":"2025-12-02T22:30:55.288256762Z","modified_time":"2024-08-10T16:25:59Z","source":"kam193","sha256":"eabfeab24c4de1451619c0588b65955da3b6ab4e6cfe5db4fdd48f6ef785d03c","id":"pypi/2024-08-sleipnirbrowser-web3/jupphelp","ranges":[{"events":[{"introduced":"0"}],"type":"ECOSYSTEM"}]},{"import_time":"2025-12-02T23:07:18.312326506Z","modified_time":"2024-08-10T16:25:59Z","source":"kam193","sha256":"dcda51f3ac0b82ef824630ce053d4dc42aa2021baf16e476ca83ef8d7f7c1cab","id":"pypi/2024-08-sleipnirbrowser-web3/jupphelp","ranges":[{"events":[{"introduced":"0"}],"type":"ECOSYSTEM"}]},{"import_time":"2025-12-10T21:38:57.557512921Z","modified_time":"2024-08-10T16:25:59Z","source":"kam193","sha256":"1e21360df6072212b4970cc75a78f3e4538ba09a4b6c4ccc54b9f40925099488","id":"pypi/2024-08-sleipnirbrowser-web3/jupphelp","versions":["0.1.0"]}],"iocs":{"domains":["sleipnirbrowser.org"],"urls":["https://sleipnirbrowser.org/api/python/14526470/win","https://sleipnirbrowser.org/api/python/79D83767/mac","https://sleipnirbrowser.org/api/python/79D83767/win"]}},"references":[{"type":"EVIDENCE","url":"https://www.virustotal.com/gui/file/22463611269abfdfca5d7dca9f77b113ab8b0d687e1059f7ef700c455880902e/detection"},{"type":"WEB","url":"https://lookyloo.circl.lu/tree/43955986-8758-452c-ace6-d6a01f15131b"},{"type":"EVIDENCE","url":"https://tria.ge/240817-whze2aydkc"},{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/jupphelp"}],"affected":[{"package":{"name":"jupphelp","ecosystem":"PyPI","purl":"pkg:pypi/jupphelp"},"versions":["0.1.0"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/jupphelp/MAL-2024-12296.json"}}],"schema_version":"1.7.3","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"]},{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"REPORTER"}]}