{"id":"MAL-2025-47778","summary":"Malicious code in k7eela (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (ed0626762f4c1981700c0a6a6782dce64b6ebe2a9dc478b5a3d4ad2f186f8645)\nImporting the module downloads and executes widely recognized malware\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2025-08-k7eel\n\n\nReasons (based on the campaign):\n\n\n - Downloads and executes a remote executable.\n\n\n - malware\n","modified":"2026-03-19T12:54:21.164747Z","published":"2025-08-21T09:05:54Z","database_specific":{"iocs":{"urls":["https://github.com/mtlnewacc6-sys/adadad/raw/refs/heads/main/x69.exe","https://github.com/byebyeeeeeeaaa/turbo-guide/raw/refs/heads/main/Payload.exe","https://github.com/deprosinal/legendary-funicular/raw/refs/heads/main/helo.exe","https://github.com/deprosinal/didactic-octo-funicular/raw/refs/heads/main/Payload.exe","https://github.com/deprosinal/sturdy-fiesta/raw/refs/heads/main/XClient.exe","https://github.com/deprosinal/jubilant-parakeet/raw/refs/heads/main/41222.exe","https://github.com/deprosinal/shiny-telegram/raw/refs/heads/main/XClient.exe"]},"malicious-packages-origins":[{"source":"reversing-labs","sha256":"6552e2553a9dcf3e97cfbaed8e47032a2bebe4ffe9f08f3127aa58fdbae4af5d","import_time":"2025-09-26T11:05:34.004505645Z","versions":["0.1.1","0.1.2","0.1.3"],"modified_time":"2025-09-26T09:14:09Z","id":"RLMA-2025-04782"},{"source":"kam193","sha256":"d7e3fe39dd34e77fa1c0bd55ea84e631d5395c3e85344e51114fb4e68e4d2edb","import_time":"2025-12-02T22:30:55.294223864Z","versions":["0.1.3","0.1.2","0.1.1"],"modified_time":"2025-08-21T09:05:54.558629Z","id":"pypi/2025-08-k7eel/k7eela"},{"source":"kam193","sha256":"ed0626762f4c1981700c0a6a6782dce64b6ebe2a9dc478b5a3d4ad2f186f8645","import_time":"2025-12-02T23:07:18.319243848Z","versions":["0.1.3","0.1.2","0.1.1"],"modified_time":"2025-08-21T09:05:54.558629Z","id":"pypi/2025-08-k7eel/k7eela"},{"source":"kam193","sha256":"ddd29021aa1b51a4007900402350f3008e1fb6f931a08ca77674c9cdc1db2044","import_time":"2025-12-30T22:39:04.113468252Z","versions":["0.1.1","0.1.2","0.1.3"],"modified_time":"2025-08-21T09:05:54.558629Z","id":"pypi/2025-08-k7eel/k7eela"},{"source":"reversing-labs","sha256":"efc7140c752aa1d4c47b7f6641977eb16c55a2d893cb881d4e5870e61a641fc3","import_time":"2026-03-19T12:19:57.212338326Z","modified_time":"2026-03-18T12:15:20Z","id":"RLUA-2026-00449"}]},"references":[{"type":"EVIDENCE","url":"https://www.virustotal.com/gui/file/b72c29249dee7744ef350444177c65cf34ae8543295dc0b45d20154f564e6c4c/detection"},{"type":"EVIDENCE","url":"https://www.virustotal.com/gui/file/243dcfb04a7d3729ccdd58bf7e764ff1b39a8d8f886528d633cca2230797e799/detection"},{"type":"EVIDENCE","url":"https://www.virustotal.com/gui/file/7146846de021736051dd919b0b6ab35a64b50fae1c9cca60d301f72795bafaec/detection"},{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/k7eela"}],"affected":[{"package":{"name":"k7eela","ecosystem":"PyPI","purl":"pkg:pypi/k7eela"},"versions":["0.1.1","0.1.2","0.1.3"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/k7eela/MAL-2025-47778.json"}}],"schema_version":"1.7.5","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"]},{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"REPORTER"},{"name":"ReversingLabs","contact":["https://www.reversinglabs.com"],"type":"FINDER"}]}