{"id":"MAL-2026-2494","summary":"Malicious code in databasetapes (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (404d8a348eab93d01fb25c7782536976b78123759077cf06cd939ddf6cba9bf8)\nDuring installation package downloads and runs a malicious executable. Likely continuation of 2026-03-rowrap.\n\nThe campaign is built over a malicious Roblox API wrapper. The roboat[.]pro domain advertises a wrapper that is either directly malicious (as roboat collected in the campaign 2026-03-rowrap) or uses a malicious dependencies (like roboat-utils). New versions are published simultaneously with malicious dependencies and quickly removed. Another advertisement channel is https://github.com/Addi9000/roboat referencing two active contributors: https://github.com/Addi9000 and https://github.com/RoCruise\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2026-03-roboat-addition\n\n\nReasons (based on the campaign):\n\n\n - The package overrides the install command in setup.py to execute malicious code during installation.\n\n\n - Downloads and executes a remote executable.\n\n\n - malware\n\n\n - clones-real-package\n\n\n - The malicious code is intentionally included in a dependency of the package\n","modified":"2026-04-08T10:33:33.467254Z","published":"2026-04-05T19:35:23Z","database_specific":{"iocs":{"urls":["https://jolly-violet-def9.staraledreamer.workers.dev/DDDD.exe","https://holy-sun-41ff.staraledreamer.workers.dev/gore.vbs","https://github.com/betonme27/flies/releases/download/a/s22s.zhr","https://dawn-thunder-f821.staraledreamer.workers.dev/gore.vbs","https://green-shadow-38d7.aledreamsaledreams2.workers.dev/tree.vbs","https://spring-math-9df3.aledreamsaledreams2.workers.dev/winre.bat"],"domains":["jolly-violet-def9.staraledreamer.workers.dev","holy-sun-41ff.staraledreamer.workers.dev","spring-math-9df3.aledreamsaledreams2.workers.dev"]},"malicious-packages-origins":[{"source":"kam193","import_time":"2026-04-05T19:45:11.066735984Z","sha256":"b80211cd83eadafb46b131727e00759d3766bc1e1d2c25d399ddc9150ecf32e1","versions":["0.0.4"],"id":"pypi/2026-03-roboat-addition/databasetapes","modified_time":"2026-04-05T19:35:23.445342Z"},{"source":"kam193","import_time":"2026-04-08T10:27:39.258052956Z","sha256":"404d8a348eab93d01fb25c7782536976b78123759077cf06cd939ddf6cba9bf8","versions":["0.0.4"],"id":"pypi/2026-03-roboat-addition/databasetapes","modified_time":"2026-04-05T19:35:23.445342Z"}]},"references":[{"type":"EVIDENCE","url":"https://www.virustotal.com/gui/file/9f14d239ab8f1289bc7aedeb67d3d72b467ee6c11b201890ab14c5c4f7c175d2/detection"},{"type":"EVIDENCE","url":"https://www.virustotal.com/gui/file/48b108261d5de97a42eff81cf1a60a32286f72bf8b5f130959e0daa86b783608"},{"type":"EVIDENCE","url":"https://www.virustotal.com/gui/file/ef20289b52ab23ec23c5ff885a2293523ce8456fb00e3d67f1b084c28f7d282a/detection"},{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/databasetapes"},{"type":"WEB","url":"https://github.com/Addi9000/roboat/blob/331166c8ea3bd080f08fe6d571202e3b47017ed7/README.md#L31"},{"type":"WEB","url":"https://github.com/Addi9000/roboat/commit/331166c8ea3bd080f08fe6d571202e3b47017ed7"},{"type":"WEB","url":"https://github.com/Addi9000"},{"type":"WEB","url":"https://github.com/RoCruise"},{"type":"WEB","url":"https://www.roboat.pro/"}],"affected":[{"package":{"name":"databasetapes","ecosystem":"PyPI","purl":"pkg:pypi/databasetapes"},"versions":["0.0.4"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/databasetapes/MAL-2026-2494.json"}}],"schema_version":"1.7.5","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"REPORTER"}]}