MAL-2025-3448

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/httpx-client/MAL-2025-3448.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2025-3448
Published
2025-03-17T21:47:06Z
Modified
2026-03-19T12:53:44.632250Z
Summary
Malicious code in httpx-client (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (d26dbf9fa1035b8b1e189f67123ee22f506cd21c08e17c282176a716af9da033)

Importing the module starts downloading and executing first a script, and then a widely identified malware

Packages are used as dependencies in a GitHub project https://github.com/ToolParadiseDrako/Nuker-Tool-Paradise


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2025-03-httpx-client

Reasons (based on the campaign):

  • Downloads and executes a remote executable.

  • Downloads and executes a remote malicious script.

  • malware

Database specific
{
    "malicious-packages-origins": [
        {
            "versions": [
                "0.0.1"
            ],
            "source": "reversing-labs",
            "import_time": "2025-04-25T09:36:46.479234093Z",
            "modified_time": "2025-04-23T16:06:25Z",
            "id": "RLMA-2025-02510",
            "sha256": "9ff2d32be1f48fa36bb92be791d851bbd82410dbaff5e4d25129b3f8afac669c"
        },
        {
            "sha256": "6fdc9cdaef31f88070b3abd593a1854c51a88eba4e915f16c553ce10a5c625fa",
            "source": "kam193",
            "import_time": "2025-12-02T22:30:55.259505059Z",
            "modified_time": "2025-03-17T21:47:06Z",
            "id": "pypi/2025-03-httpx-client/httpx-client",
            "ranges": [
                {
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ],
                    "type": "ECOSYSTEM"
                }
            ]
        },
        {
            "sha256": "d26dbf9fa1035b8b1e189f67123ee22f506cd21c08e17c282176a716af9da033",
            "source": "kam193",
            "import_time": "2025-12-02T23:07:18.283190748Z",
            "modified_time": "2025-03-17T21:47:06Z",
            "id": "pypi/2025-03-httpx-client/httpx-client",
            "ranges": [
                {
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ],
                    "type": "ECOSYSTEM"
                }
            ]
        },
        {
            "versions": [
                "0.0.1"
            ],
            "source": "kam193",
            "import_time": "2025-12-10T21:38:57.534601197Z",
            "modified_time": "2025-03-17T21:47:06Z",
            "id": "pypi/2025-03-httpx-client/httpx-client",
            "sha256": "a0ed7307c7fc2d4cb66bfc22e731e688cabb34b1b8f481e5faa8cd8bae996cb2"
        },
        {
            "source": "reversing-labs",
            "import_time": "2026-03-19T12:19:52.99904183Z",
            "modified_time": "2026-03-18T12:14:47Z",
            "id": "RLUA-2026-00403",
            "sha256": "87d2fbdf54ffb1b9f5e6d6126bfc59f1e64a6b142880ab859250df371a65d596"
        }
    ],
    "iocs": {
        "urls": [
            "https://zetolacs-cloud.top/Stb/Retev.php?bl=Uic2YYQdDhtfiKAZnULCW012.txt",
            "https://raw.githubusercontent.com/mrunknown12321/1234/refs/heads/main/1234",
            "https://raw.githubusercontent.com/VinieClara/FN-Manfiestes/main/SdkVersion.txt"
        ],
        "domains": [
            "zetolacs-cloud.top",
            "contorosa.space"
        ]
    }
}
References
Credits

Affected packages

PyPI / httpx-client

Package

Affected ranges

Affected versions

0.*
0.0.1

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/httpx-client/MAL-2025-3448.json"