MAL-2025-47778

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/k7eela/MAL-2025-47778.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2025-47778
Published
2025-08-21T09:05:54Z
Modified
2026-03-19T12:54:21.164747Z
Summary
Malicious code in k7eela (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (ed0626762f4c1981700c0a6a6782dce64b6ebe2a9dc478b5a3d4ad2f186f8645)

Importing the module downloads and executes widely recognized malware


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2025-08-k7eel

Reasons (based on the campaign):

  • Downloads and executes a remote executable.

  • malware

Database specific
{
    "iocs": {
        "urls": [
            "https://github.com/mtlnewacc6-sys/adadad/raw/refs/heads/main/x69.exe",
            "https://github.com/byebyeeeeeeaaa/turbo-guide/raw/refs/heads/main/Payload.exe",
            "https://github.com/deprosinal/legendary-funicular/raw/refs/heads/main/helo.exe",
            "https://github.com/deprosinal/didactic-octo-funicular/raw/refs/heads/main/Payload.exe",
            "https://github.com/deprosinal/sturdy-fiesta/raw/refs/heads/main/XClient.exe",
            "https://github.com/deprosinal/jubilant-parakeet/raw/refs/heads/main/41222.exe",
            "https://github.com/deprosinal/shiny-telegram/raw/refs/heads/main/XClient.exe"
        ]
    },
    "malicious-packages-origins": [
        {
            "modified_time": "2025-09-26T09:14:09Z",
            "sha256": "6552e2553a9dcf3e97cfbaed8e47032a2bebe4ffe9f08f3127aa58fdbae4af5d",
            "source": "reversing-labs",
            "import_time": "2025-09-26T11:05:34.004505645Z",
            "id": "RLMA-2025-04782",
            "versions": [
                "0.1.1",
                "0.1.2",
                "0.1.3"
            ]
        },
        {
            "modified_time": "2025-08-21T09:05:54.558629Z",
            "sha256": "d7e3fe39dd34e77fa1c0bd55ea84e631d5395c3e85344e51114fb4e68e4d2edb",
            "source": "kam193",
            "import_time": "2025-12-02T22:30:55.294223864Z",
            "id": "pypi/2025-08-k7eel/k7eela",
            "versions": [
                "0.1.3",
                "0.1.2",
                "0.1.1"
            ]
        },
        {
            "modified_time": "2025-08-21T09:05:54.558629Z",
            "sha256": "ed0626762f4c1981700c0a6a6782dce64b6ebe2a9dc478b5a3d4ad2f186f8645",
            "source": "kam193",
            "import_time": "2025-12-02T23:07:18.319243848Z",
            "id": "pypi/2025-08-k7eel/k7eela",
            "versions": [
                "0.1.3",
                "0.1.2",
                "0.1.1"
            ]
        },
        {
            "modified_time": "2025-08-21T09:05:54.558629Z",
            "sha256": "ddd29021aa1b51a4007900402350f3008e1fb6f931a08ca77674c9cdc1db2044",
            "source": "kam193",
            "import_time": "2025-12-30T22:39:04.113468252Z",
            "id": "pypi/2025-08-k7eel/k7eela",
            "versions": [
                "0.1.1",
                "0.1.2",
                "0.1.3"
            ]
        },
        {
            "modified_time": "2026-03-18T12:15:20Z",
            "sha256": "efc7140c752aa1d4c47b7f6641977eb16c55a2d893cb881d4e5870e61a641fc3",
            "source": "reversing-labs",
            "import_time": "2026-03-19T12:19:57.212338326Z",
            "id": "RLUA-2026-00449"
        }
    ]
}
References
Credits

Affected packages

PyPI / k7eela

Package

Affected ranges

Affected versions

0.*
0.1.1
0.1.2
0.1.3

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/k7eela/MAL-2025-47778.json"