{"id":"MAL-2024-5574","summary":"Malicious code in public-address-generator (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n","modified":"2024-10-24T01:01:59Z","published":"2024-06-25T13:38:55Z","database_specific":{"malicious-packages-origins":[{"versions":["1.1.1","1.0.0","1.1.3","1.0.1","1.0.2","1.0.3","1.1.2"],"import_time":"2024-06-28T02:49:50.75122122Z","id":"RLMA-2024-04356","modified_time":"2024-06-25T13:38:55Z","source":"reversing-labs","sha256":"8af49389eaebe40bdeff6b61a5d762372a09663b6c43c5da43fbfec6c9634267"},{"modified_time":"2024-10-16T14:46:29Z","import_time":"2024-10-24T00:59:41.691052525Z","id":"RLUA-2024-08789","source":"reversing-labs","sha256":"e396d12077986038a77f0a61c9c2369638cb1ed19894bedb68a0c80377e0e625"}]},"references":[{"type":"ARTICLE","url":"https://www.reversinglabs.com/blog/bipclip-malicious-pypi-packages-target-crypto-wallet-recovery-passwords"}],"affected":[{"package":{"name":"public-address-generator","ecosystem":"PyPI","purl":"pkg:pypi/public-address-generator"},"versions":["1.1.1","1.0.0","1.1.3","1.0.1","1.0.2","1.0.3","1.1.2"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/public-address-generator/MAL-2024-5574.json"}}],"schema_version":"1.7.3","credits":[{"name":"ReversingLabs","contact":["https://www.reversinglabs.com"],"type":"FINDER"}]}