MAL-2024-9957

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/byted-tbs/MAL-2024-9957.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2024-9957
Published
2024-08-22T22:25:03Z
Modified
2026-03-19T12:51:27.242042Z
Summary
Malicious code in byted-tbs (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (749adf634a79e321082a53a1715caf4c239935563b6c3dadbd8e3e60e0e41485)

Collects basic information about the system, most probably a pentest or bug bounty.


Category: PROBABLY_PENTEST - Packages looking like typical pentest packages, but also anything that looks like testing, exploring pre-prepared kits, research & co, with clearly low-harm possibilities.

Campaign: 2024-08-byted-22.ax

Reasons (based on the campaign):

  • The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.
Database specific
{
    "malicious-packages-origins": [
        {
            "import_time": "2024-10-24T00:56:54.573203465Z",
            "modified_time": "2024-10-16T14:37:19Z",
            "sha256": "d9ee68a28ecc687350b9b7d9d8dabd25f35abbb1e0b67f4301c7db80a46ba6d6",
            "source": "reversing-labs",
            "versions": [
                "0.1.0"
            ],
            "id": "RLMA-2024-07909"
        },
        {
            "import_time": "2025-12-02T22:30:55.899402134Z",
            "modified_time": "2024-08-22T22:25:03Z",
            "sha256": "c3a53a7c8acbad5a8fbd4f7d5d6fb603797208edeb860e7e0a792c51465a7dc6",
            "source": "kam193",
            "ranges": [
                {
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ],
                    "type": "ECOSYSTEM"
                }
            ],
            "id": "pypi/2024-08-byted-22.ax/byted-tbs"
        },
        {
            "import_time": "2025-12-02T23:07:19.087280128Z",
            "modified_time": "2024-08-22T22:25:03Z",
            "sha256": "749adf634a79e321082a53a1715caf4c239935563b6c3dadbd8e3e60e0e41485",
            "source": "kam193",
            "ranges": [
                {
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ],
                    "type": "ECOSYSTEM"
                }
            ],
            "id": "pypi/2024-08-byted-22.ax/byted-tbs"
        },
        {
            "import_time": "2025-12-10T21:38:58.218230313Z",
            "modified_time": "2024-08-22T22:25:03Z",
            "sha256": "8f39a268af75e3669e5104359e23f59174edc1068a36444af8b2a83d0ec85216",
            "source": "kam193",
            "versions": [
                "0.1.0"
            ],
            "id": "pypi/2024-08-byted-22.ax/byted-tbs"
        },
        {
            "import_time": "2026-03-19T12:19:31.579238655Z",
            "modified_time": "2026-03-18T12:12:09Z",
            "sha256": "230a48a5e936ca70c96783b7b4b870aa2f7a23a9a17eb6e616ac37cde2b52dfd",
            "source": "reversing-labs",
            "id": "RLUA-2026-00168"
        }
    ],
    "iocs": {
        "domains": [
            "zkecscnceogkcofvfnoqhyc1gg3hf6aqe.22.ax"
        ]
    }
}
References
Credits

Affected packages

PyPI / byted-tbs

Package

Affected ranges

Affected versions

0.*
0.1.0

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/byted-tbs/MAL-2024-9957.json"