{"id":"MAL-2024-5078","summary":"Malicious code in discordpy-bypass (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n","modified":"2024-12-09T14:39:23Z","published":"2024-06-25T13:34:55Z","database_specific":{"malicious-packages-origins":[{"versions":["1.6","1.7","1.0","1.3","1.5","1.2","1.1","1.4"],"import_time":"2024-06-28T02:48:51.498799455Z","sha256":"f90068c8e68e0e06dd53477dcf0acd50b99ad27bea54337832bbefbea66f252d","id":"RLMA-2024-03858","modified_time":"2024-06-25T13:34:55Z","source":"reversing-labs"},{"import_time":"2024-12-09T14:38:53.488335274Z","sha256":"01f93eb848278e98c80cb1e11ff6d09ebecda40c00bb239d004089c23c71d70d","id":"RLUA-2024-11027","modified_time":"2024-12-09T06:50:09Z","source":"reversing-labs"}]},"references":[{"type":"ARTICLE","url":"https://www.fortinet.com/blog/threat-research/unraveling-cyber-threats-insights-from-code-analysis"},{"type":"ARTICLE","url":"https://socket.dev/blog/trends-in-malicious-packages-targeting-discord"}],"affected":[{"package":{"name":"discordpy-bypass","ecosystem":"PyPI","purl":"pkg:pypi/discordpy-bypass"},"versions":["1.6","1.7","1.0","1.3","1.5","1.2","1.1","1.4"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/discordpy-bypass/MAL-2024-5078.json"}}],"schema_version":"1.7.3","credits":[{"name":"ReversingLabs","contact":["https://www.reversinglabs.com"],"type":"FINDER"}]}