MAL-2025-47760

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/editidle/MAL-2025-47760.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2025-47760
Published
2025-08-24T08:29:29Z
Modified
2026-03-19T12:52:49.931411Z
Summary
Malicious code in editidle (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (6acb95024483d09d3cd1a7ff0bb4afa96d88624e8106f82ed5a6a0153f90c235)

Importing the module downloads and executes widely recognized malware


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2025-08-k7eel

Reasons (based on the campaign):

  • Downloads and executes a remote executable.

  • malware

Database specific
{
    "iocs": {
        "urls": [
            "https://github.com/mtlnewacc6-sys/adadad/raw/refs/heads/main/x69.exe",
            "https://github.com/byebyeeeeeeaaa/turbo-guide/raw/refs/heads/main/Payload.exe",
            "https://github.com/deprosinal/legendary-funicular/raw/refs/heads/main/helo.exe",
            "https://github.com/deprosinal/didactic-octo-funicular/raw/refs/heads/main/Payload.exe",
            "https://github.com/deprosinal/sturdy-fiesta/raw/refs/heads/main/XClient.exe",
            "https://github.com/deprosinal/jubilant-parakeet/raw/refs/heads/main/41222.exe",
            "https://github.com/deprosinal/shiny-telegram/raw/refs/heads/main/XClient.exe"
        ]
    },
    "malicious-packages-origins": [
        {
            "source": "reversing-labs",
            "id": "RLMA-2025-04761",
            "modified_time": "2025-09-26T09:13:54Z",
            "sha256": "3a0326a4345316d9d27b3f64380d9c0286e52c5d361fad6bb1ffbef18b9e40a6",
            "versions": [
                "0.1.1"
            ],
            "import_time": "2025-09-26T11:05:32.414495385Z"
        },
        {
            "source": "kam193",
            "id": "pypi/2025-08-k7eel/editidle",
            "modified_time": "2025-08-24T08:29:29.213201Z",
            "sha256": "d22ad704c26acff50e8127d3be97d723a35a3ea997e001a2581af0fab752df1e",
            "versions": [
                "0.1.1"
            ],
            "import_time": "2025-12-02T22:30:55.121808586Z"
        },
        {
            "source": "kam193",
            "id": "pypi/2025-08-k7eel/editidle",
            "modified_time": "2025-08-24T08:29:29.213201Z",
            "sha256": "6acb95024483d09d3cd1a7ff0bb4afa96d88624e8106f82ed5a6a0153f90c235",
            "versions": [
                "0.1.1"
            ],
            "import_time": "2025-12-02T23:07:18.132820357Z"
        },
        {
            "source": "reversing-labs",
            "id": "RLUA-2026-00288",
            "modified_time": "2026-03-18T12:13:28Z",
            "sha256": "921e20674965844e27d4da4d49fa995f302d834339c62b4470bec032bc693b49",
            "import_time": "2026-03-19T12:19:42.258827028Z"
        }
    ]
}
References
Credits

Affected packages

PyPI / editidle

Package

Affected ranges

Affected versions

0.*
0.1.1

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/editidle/MAL-2025-47760.json"