MAL-2025-3011

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/transaction-analyze/MAL-2025-3011.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2025-3011
Published
2025-02-24T10:06:17Z
Modified
2026-03-19T12:57:41.858109Z
Summary
Malicious code in transaction-analyze (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (de16c0c85e09c235c78e898320412a3a2ae473c2ae91e939862b5e99fcb5950b)

Package contains obfuscated code that exfiltrate basic data and awaits for commands from the remote server to execute them. This is a malicious copy of legitimate https://pypi.org/project/coinanalyse/ package.


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2025-02-coinanalyze

Reasons (based on the campaign):

  • backdoor

  • typosquatting

  • obfuscation

  • clones-real-package

  • crypto-related

  • The package contains code to execute remote commands (probably limited to a specific set) on the victim's machine.

Database specific
{
    "iocs": {
        "domains": [
            "wonderchristmas.store",
            "netupdates.info"
        ],
        "urls": [
            "https://wonderchristmas.store/jupdate.php",
            "http://netupdates.info/board/board.php"
        ]
    },
    "malicious-packages-origins": [
        {
            "import_time": "2025-03-31T07:07:07.145523753Z",
            "id": "RLMA-2025-02010",
            "versions": [
                "1.0.1",
                "1.0.2",
                "1.0.3",
                "1.0.4"
            ],
            "source": "reversing-labs",
            "modified_time": "2025-03-28T13:06:26Z",
            "sha256": "b7c055d0b6120500a77f1c8d41953efdd109a5e078a153f6c1984f0cbe35c5af"
        },
        {
            "import_time": "2025-12-02T22:30:55.6574316Z",
            "ranges": [
                {
                    "type": "ECOSYSTEM",
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ]
                }
            ],
            "id": "pypi/2025-02-coinanalyze/transaction-analyze",
            "source": "kam193",
            "modified_time": "2025-02-24T10:06:17Z",
            "sha256": "b94b0a02279e4e7ab3a874e5c93505194f3c29ec7bdb930c310ee4b458ee1293"
        },
        {
            "import_time": "2025-12-02T23:07:18.700801687Z",
            "ranges": [
                {
                    "type": "ECOSYSTEM",
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ]
                }
            ],
            "id": "pypi/2025-02-coinanalyze/transaction-analyze",
            "source": "kam193",
            "modified_time": "2025-02-24T10:06:17Z",
            "sha256": "de16c0c85e09c235c78e898320412a3a2ae473c2ae91e939862b5e99fcb5950b"
        },
        {
            "import_time": "2025-12-10T21:38:57.885962382Z",
            "id": "pypi/2025-02-coinanalyze/transaction-analyze",
            "versions": [
                "1.0.1",
                "1.0.3",
                "1.0.4"
            ],
            "source": "kam193",
            "modified_time": "2025-02-24T10:06:17Z",
            "sha256": "2c7bf1798f81239fa4d39b94c0b243db09e286b26f329fa0db4da86a21a9960e"
        },
        {
            "import_time": "2026-03-19T12:20:35.243166014Z",
            "id": "RLUA-2026-00836",
            "source": "reversing-labs",
            "modified_time": "2026-03-18T12:19:38Z",
            "sha256": "61207328671c30bda41bf41765a7138089aa03dbde27f6bda478eada114fd1c3"
        }
    ]
}
References
Credits

Affected packages

PyPI / transaction-analyze

Package

Name
transaction-analyze
View open source insights on deps.dev
Purl
pkg:pypi/transaction-analyze

Affected ranges

Affected versions

1.*
1.0.1
1.0.2
1.0.3
1.0.4

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/transaction-analyze/MAL-2025-3011.json"