{"id":"MAL-2026-639","summary":"Malicious code in connection-api-requests (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (1e1edf0790733aa25ad085b523a095b1ee4abee84eca696bbcaf1682cca2c2ad)\nImporting the module downloads and starts remote executable identified as malware\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2025-12-foxloveyou\n\n\nReasons (based on the campaign):\n\n\n - malware\n\n\n - Downloads and executes a remote executable.\n","modified":"2026-02-02T07:32:54.096847Z","published":"2026-02-02T06:49:31Z","database_specific":{"malicious-packages-origins":[{"import_time":"2026-02-02T07:27:07.609617491Z","modified_time":"2026-02-02T06:49:31.887341Z","sha256":"1e1edf0790733aa25ad085b523a095b1ee4abee84eca696bbcaf1682cca2c2ad","id":"pypi/2025-12-foxloveyou/connection-api-requests","versions":["0.3.0","0.3.1"],"source":"kam193"}],"iocs":{"domains":["3zoz.duckdns.org"],"urls":["http://3zoz.duckdns.org:1111/1234","http://3zoz.duckdns.org/config"]}},"references":[{"type":"EVIDENCE","url":"https://www.virustotal.com/gui/file/cb04d8f744d3df997cf47ce691d6e6e9ad5f6a0d19de70931b5591f2557ab116/summary"},{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/connection-api-requests"}],"affected":[{"package":{"name":"connection-api-requests","ecosystem":"PyPI","purl":"pkg:pypi/connection-api-requests"},"versions":["0.3.0","0.3.1"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/connection-api-requests/MAL-2026-639.json"}}],"schema_version":"1.7.3","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"REPORTER"}]}