{"id":"MAL-2024-9940","summary":"Malicious code in antibyfron (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (b18b332b0269a1ac32574b6676f3c4a5d85c8bc7d64519987a8ad8d740038331)\nImporting a module starts downloading and executing an infostealer, widely identified by AV/sandboxes.\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2024-08-embeds-RealtekHDAudioManager\n\n\nReasons (based on the campaign):\n\n\n - infostealer\n\n\n - Downloads and executes a remote executable.\n","modified":"2026-03-19T13:01:47.825265Z","published":"2024-09-04T21:25:32Z","database_specific":{"malicious-packages-origins":[{"import_time":"2024-10-24T00:56:53.236553527Z","modified_time":"2024-10-16T14:36:21Z","id":"RLMA-2024-07817","sha256":"121b8cf760d7229e73c8cb5f6dfd7617088cb7abbaf9012664df35031bf3634e","source":"reversing-labs","versions":["0.0.1"]},{"import_time":"2025-12-02T22:30:54.909698146Z","modified_time":"2024-09-04T21:25:32Z","id":"pypi/2024-08-embeds-RealtekHDAudioManager/antibyfron","sha256":"6fc9ffd90a21e6217a33fbf5b0de7b061e5134c919d88d7fcb0a5bb50c076b8b","source":"kam193","ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]},{"import_time":"2025-12-02T23:07:17.951244124Z","modified_time":"2024-09-04T21:25:32Z","id":"pypi/2024-08-embeds-RealtekHDAudioManager/antibyfron","sha256":"b18b332b0269a1ac32574b6676f3c4a5d85c8bc7d64519987a8ad8d740038331","source":"kam193","ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}]},{"import_time":"2025-12-10T21:38:57.254792919Z","modified_time":"2024-09-04T21:25:32Z","id":"pypi/2024-08-embeds-RealtekHDAudioManager/antibyfron","sha256":"859447398b4176794849892ea501361098e1f1ff30c946fa399136cad80a5bda","source":"kam193","versions":["0.0.1"]},{"import_time":"2026-03-19T12:19:22.683833484Z","modified_time":"2026-03-18T12:11:03Z","id":"RLUA-2026-00069","sha256":"98751de354f1e493bca4ea7a478a7349642d09f90d03690885f8ff661201e4ab","source":"reversing-labs"}],"iocs":{"urls":["https://github.com/holdthatcode/host/raw/main/howl.exe","https://github.com/holdthatcode/host/raw/main/menu.exe","https://raw.githubusercontent.com/bloodstainedvvs/host/main/code.exe","https://github.com/bloodstainedvvs/host/raw/main/zwerve.exe","https://cdn.discordapp.com/attachments/1276975489780809812/1282787632082059359/zwerve.exe?ex=66e0a094&is=66df4f14&hm=f4604d9783911e770716516e30d4f665214449f46aa2c5a59afc4bda7042bfba&","https://github.com/holdthatcode/e/raw/main/code.exe","https://github.com/holdthatcode/e/raw/main/zwerve.exe","https://github.com/holdthatcode/e/raw/main/CBLines.exe","https://github.com/holdthatcode/e/raw/main/Anch.exe"]}},"references":[{"type":"EVIDENCE","url":"https://www.virustotal.com/gui/file/249c91245c949e8e7cc7f4bd3d6aef9b354c1d249fc3097b0363862ed7269886"},{"type":"EVIDENCE","url":"https://tria.ge/240904-zj4b6awckl/behavioral1"},{"type":"EVIDENCE","url":"https://www.virustotal.com/gui/file/62a7ed6c03d5e519cc5121fe8ad967bdadbbda106a3250b03ab50fb10457ed37"},{"type":"EVIDENCE","url":"https://tria.ge/240913-pcqgls1cna"},{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/antibyfron"}],"affected":[{"package":{"name":"antibyfron","ecosystem":"PyPI","purl":"pkg:pypi/antibyfron"},"versions":["0.0.1"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/antibyfron/MAL-2024-9940.json"}}],"schema_version":"1.7.5","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"]},{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"REPORTER"},{"name":"ReversingLabs","contact":["https://www.reversinglabs.com"],"type":"FINDER"}]}