MAL-2024-8946

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/rcebymrx/MAL-2024-8946.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2024-8946
Published
2024-09-23T14:00:45Z
Modified
2025-12-12T20:40:26.094693Z
Summary
Malicious code in rcebymrx (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (65ddcbfb52d8c96bb51c713d62841675f75e9e5225efc9380917c6cf79bed8ab)

When importing the module, the /etc/passwd file is exfiltrated


Category: PROBABLY_PENTEST - Packages looking like typical pentest packages, but also anything that looks like testing, exploring pre-prepared kits, research & co, with clearly low-harm possibilities.

Campaign: 2024-09-mrx1w1

Reasons (based on the campaign):

  • files-exfiltration

Source: ossf-package-analysis (b40993e43a581dac0abf88febbde6e0fb833dffb80824ed65880847c3309968d)

The OpenSSF Package Analysis project identified 'rcebymrx' @ 0.0.1 (pypi) as malicious.

It is considered malicious because:

  • The package communicates with a domain associated with malicious activity.
Database specific
{
    "malicious-packages-origins": [
        {
            "sha256": "b40993e43a581dac0abf88febbde6e0fb833dffb80824ed65880847c3309968d",
            "source": "ossf-package-analysis",
            "versions": [
                "0.0.1"
            ],
            "import_time": "2024-09-23T14:05:02.370751837Z",
            "modified_time": "2024-09-23T14:00:45Z"
        },
        {
            "sha256": "15f02f476bdb49f08203ae81feef2040d55d3b599ab38808c85ec5c3bbba6c63",
            "ranges": [
                {
                    "type": "ECOSYSTEM",
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ]
                }
            ],
            "source": "kam193",
            "id": "pypi/2024-09-mrx1w1/rcebymrx",
            "import_time": "2025-12-02T22:30:56.364029186Z",
            "modified_time": "2024-09-23T14:13:26Z"
        },
        {
            "sha256": "65ddcbfb52d8c96bb51c713d62841675f75e9e5225efc9380917c6cf79bed8ab",
            "ranges": [
                {
                    "type": "ECOSYSTEM",
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ]
                }
            ],
            "source": "kam193",
            "id": "pypi/2024-09-mrx1w1/rcebymrx",
            "import_time": "2025-12-02T23:07:19.551530072Z",
            "modified_time": "2024-09-23T14:13:26Z"
        },
        {
            "sha256": "4b29448a21fc4a8c94ef1cffba23cf91fdc28f419a3455f67f4963c2f29665d7",
            "source": "kam193",
            "id": "pypi/2024-09-mrx1w1/rcebymrx",
            "import_time": "2025-12-10T21:38:58.653180025Z",
            "versions": [
                "0.0.1"
            ],
            "modified_time": "2024-09-23T14:13:26Z"
        }
    ]
}
References
Credits

Affected packages

PyPI / rcebymrx

Package

Affected ranges

Affected versions

0.*
0.0.1

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/rcebymrx/MAL-2024-8946.json"