Skip to content

Commit 7978077

Browse files
author
github-actions
committed
Ingest OSV - Cloud Storage
1 parent f47e0ca commit 7978077

File tree

2 files changed

+78
-1
lines changed

2 files changed

+78
-1
lines changed

config/start-keys.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
amazon-inspector:
22
IN-MAL-: IN-MAL-2026-000461.json
33
kam193:
4-
pypi/packages/malicious/osv/: cd8a969017ffb74e5c81b1721de4cd639f57a1e6
4+
pypi/packages/malicious/osv/: 22c5b6b33f222fe5bb87777473653b6bc4e66233
55
pypi/packages/pentest/osv/: 0d65fa30569acb74a4cd2f6968297f9cf794b510
66
pypi/packages/probably_pentest/osv/: d85355ff7c5f46aa548621c0248747e10eee650a
77
ossf-package-analysis:
Lines changed: 77 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,77 @@
1+
{
2+
"modified": "2026-03-21T19:05:47Z",
3+
"published": "2026-03-21T19:05:47Z",
4+
"schema_version": "1.7.4",
5+
"id": "",
6+
"summary": "Malicious code in thisismytest (PyPI)",
7+
"details": "During installation, the package downloads and runs a remote executable, which is identified as a backdoor. It connects with a remote server and executes basic commands\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2026-03-thisismytest\n\n\nReasons (based on the campaign):\n\n\n - malware\n\n\n - Downloads and executes a remote executable.\n\n\n - backdoor\n\n",
8+
"affected": [
9+
{
10+
"package": {
11+
"ecosystem": "PyPI",
12+
"name": "thisismytest"
13+
},
14+
"versions": [
15+
"1.0.0",
16+
"2.0.0",
17+
"3.0.0",
18+
"4.0.0",
19+
"5.0.0"
20+
]
21+
}
22+
],
23+
"references": [
24+
{
25+
"type": "EVIDENCE",
26+
"url": "https://www.virustotal.com/gui/file/ac4b2c52d238bc9893450e5068dfc62b87239bc60fc339e13a714ff9e5f312de/detection"
27+
},
28+
{
29+
"type": "EVIDENCE",
30+
"url": "https://www.virustotal.com/gui/file/72603dc2a916f5e552c16c4784aea36f39fe607dfbd1523060c2299e67253549/detection"
31+
},
32+
{
33+
"type": "WEB",
34+
"url": "https://sandbox.kunai.rocks/analysis/a120c2fb-d387-4ede-beb8-72cbf8f1a219"
35+
},
36+
{
37+
"type": "WEB",
38+
"url": "https://bad-packages.kam193.eu/pypi/package/thisismytest"
39+
}
40+
],
41+
"credits": [
42+
{
43+
"name": "Kamil Mańkowski (kam193)",
44+
"type": "REPORTER",
45+
"contact": [
46+
"https://github.com/kam193",
47+
"https://bad-packages.kam193.eu/"
48+
]
49+
}
50+
],
51+
"database_specific": {
52+
"iocs": {
53+
"ips": [
54+
"101.47.72.91"
55+
],
56+
"urls": [
57+
"http://115.190.98.52/java"
58+
]
59+
},
60+
"malicious-packages-origins": [
61+
{
62+
"source": "kam193",
63+
"sha256": "a1c269bbb834081025da993697e3e2e44db4a97e16e21f4c792ed85391772fa9",
64+
"import_time": "2026-03-21T19:39:52.895404088Z",
65+
"id": "pypi/2026-03-thisismytest/thisismytest",
66+
"modified_time": "2026-03-21T19:05:47.574472Z",
67+
"versions": [
68+
"1.0.0",
69+
"2.0.0",
70+
"3.0.0",
71+
"4.0.0",
72+
"5.0.0"
73+
]
74+
}
75+
]
76+
}
77+
}

0 commit comments

Comments
 (0)