{"id":"MAL-2026-1226","summary":"Malicious code in qwery-core (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (c4861116d64db41be8bae04818ecc9f3542fe4bc30055d57588f6f23c11149f3)\nObfuscated downloader of encrypted code, compiled to native binary. The remote URL has to be provided to the binary. Likely impersonates legitimate npm library\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2026-02-qwery-core\n\n\nReasons (based on the campaign):\n\n\n - obfuscation\n\n\n - Downloads and executes a remote malicious script.\n\n\n - impersonation\n","modified":"2026-03-03T20:16:16.377215Z","published":"2026-03-03T19:19:13Z","database_specific":{"malicious-packages-origins":[{"modified_time":"2026-03-03T19:19:13.730225Z","sha256":"c4861116d64db41be8bae04818ecc9f3542fe4bc30055d57588f6f23c11149f3","id":"pypi/2026-02-qwery-core/qwery-core","source":"kam193","import_time":"2026-03-03T20:12:03.92399377Z","versions":["1.0.0","1.0.1","1.0.2","1.0.3","1.0.4","1.0.5","1.0.6","1.0.7"]}],"iocs":{"urls":["https://t.me/NexLangPy"]}},"references":[{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/qwery-core"}],"affected":[{"package":{"name":"qwery-core","ecosystem":"PyPI","purl":"pkg:pypi/qwery-core"},"versions":["1.0.0","1.0.1","1.0.2","1.0.3","1.0.4","1.0.5","1.0.6","1.0.7"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/qwery-core/MAL-2026-1226.json"}}],"schema_version":"1.7.3","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"ANALYST"}]}