{"id":"MAL-2026-2821","summary":"Malicious code in robase-quick-install (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (f69377c01d5c0980cb9bf905be35133e5cd077e7c64c577460dc06e3871c2d9e)\nDuring installation package downloads and runs a malicious executable. Likely continuation of 2026-03-rowrap.\n\nThe campaign is built over a malicious Roblox API wrapper. The roboat[.]pro (later robase[.]app) domain advertises a wrapper that is either directly malicious (as roboat collected in the campaign 2026-03-rowrap) or uses a malicious dependencies (like roboat-utils). New versions are published simultaneously with malicious dependencies and quickly removed. Another advertisement channel is https://github.com/Addi9000/roboat referencing two active contributors: https://github.com/Addi9000 and https://github.com/RoCruise\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2026-03-roboat-addition\n\n\nReasons (based on the campaign):\n\n\n - The package overrides the install command in setup.py to execute malicious code during installation.\n\n\n - Downloads and executes a remote executable.\n\n\n - The malicious code is intentionally included in a dependency of the package\n\n\n - malware\n\n\n - clones-real-package\n","modified":"2026-04-16T23:03:29.219644Z","published":"2026-04-16T22:30:00Z","database_specific":{"malicious-packages-origins":[{"import_time":"2026-04-16T22:48:12.93261118Z","modified_time":"2026-04-16T22:30:00.367319Z","id":"pypi/2026-03-roboat-addition/robase-quick-install","source":"kam193","versions":["2.6.0"],"sha256":"f69377c01d5c0980cb9bf905be35133e5cd077e7c64c577460dc06e3871c2d9e"}],"iocs":{"urls":["https://jolly-violet-def9.staraledreamer.workers.dev/DDDD.exe","https://holy-sun-41ff.staraledreamer.workers.dev/gore.vbs","https://github.com/betonme27/flies/releases/download/a/s22s.zhr","https://dawn-thunder-f821.staraledreamer.workers.dev/gore.vbs","https://green-shadow-38d7.aledreamsaledreams2.workers.dev/tree.vbs","https://spring-math-9df3.aledreamsaledreams2.workers.dev/winre.bat","https://github.com/aledreamsaledreqms-source/frakenstein/raw/refs/heads/main/tree.vbs","https://lingering-field-4351.aledreamer1234.workers.dev/yy.bat","https://github.com/aledreamsaledreqms-source/frakenstein/raw/refs/heads/main/ee.exe","https://i-like-boys.com/tree.vbs"],"domains":["jolly-violet-def9.staraledreamer.workers.dev","holy-sun-41ff.staraledreamer.workers.dev","spring-math-9df3.aledreamsaledreams2.workers.dev","i-like-boys.com"]}},"references":[{"type":"EVIDENCE","url":"https://www.virustotal.com/gui/file/9f14d239ab8f1289bc7aedeb67d3d72b467ee6c11b201890ab14c5c4f7c175d2/detection"},{"type":"EVIDENCE","url":"https://www.virustotal.com/gui/file/48b108261d5de97a42eff81cf1a60a32286f72bf8b5f130959e0daa86b783608"},{"type":"EVIDENCE","url":"https://www.virustotal.com/gui/file/ef20289b52ab23ec23c5ff885a2293523ce8456fb00e3d67f1b084c28f7d282a/detection"},{"type":"WEB","url":"https://github.com/Addi9000/roboat/blob/331166c8ea3bd080f08fe6d571202e3b47017ed7/README.md#L31"},{"type":"WEB","url":"https://github.com/Addi9000/roboat/commit/331166c8ea3bd080f08fe6d571202e3b47017ed7"},{"type":"WEB","url":"https://github.com/Addi9000"},{"type":"WEB","url":"https://github.com/RoCruise"},{"type":"WEB","url":"https://www.roboat.pro/"},{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/robase-quick-install"}],"affected":[{"package":{"name":"robase-quick-install","ecosystem":"PyPI","purl":"pkg:pypi/robase-quick-install"},"versions":["2.6.0"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/robase-quick-install/MAL-2026-2821.json"}}],"schema_version":"1.7.5","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"REPORTER"}]}