MAL-2025-6524

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/initer/MAL-2025-6524.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2025-6524
Published
2025-05-09T20:14:13Z
Modified
2026-03-19T12:54:04.564783Z
Summary
Malicious code in initer (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (d2aac1e40660cbe4323a93d03087f3b9a2d596a5dcfcf2bae3cb0a2ab37cf646)

File is designed to download, hide under system-like name, and run a remote executable, widely identified as malicious.


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2025-05-pyiniter

Reasons (based on the campaign):

  • infostealer

  • Downloads and executes a remote executable.

Database specific
{
    "iocs": {
        "urls": [
            "https://raw.githubusercontent.com/Sierftgddfgrth/win32dll/main/win32dll.exe"
        ]
    },
    "malicious-packages-origins": [
        {
            "id": "RLMA-2025-03617",
            "sha256": "d861b2940416441d955f0078fd9ba3c35223bfce822fc68aea70992eaeff8ef1",
            "source": "reversing-labs",
            "versions": [
                "0.2.1",
                "0.2.2",
                "0.2.5",
                "0.2.6"
            ],
            "modified_time": "2025-07-31T19:15:20Z",
            "import_time": "2025-08-01T10:07:11.848733674Z"
        },
        {
            "ranges": [
                {
                    "type": "ECOSYSTEM",
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ]
                }
            ],
            "id": "pypi/2025-05-pyiniter/initer",
            "sha256": "f45885faecd0182d82ca81d8adaf52a442b0f493b06eb7b74e8252ab4f009305",
            "source": "kam193",
            "modified_time": "2025-05-09T20:14:13Z",
            "import_time": "2025-12-02T22:30:55.272800406Z"
        },
        {
            "ranges": [
                {
                    "type": "ECOSYSTEM",
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ]
                }
            ],
            "id": "pypi/2025-05-pyiniter/initer",
            "sha256": "d2aac1e40660cbe4323a93d03087f3b9a2d596a5dcfcf2bae3cb0a2ab37cf646",
            "source": "kam193",
            "modified_time": "2025-05-09T20:14:13Z",
            "import_time": "2025-12-02T23:07:18.296967663Z"
        },
        {
            "id": "pypi/2025-05-pyiniter/initer",
            "sha256": "21397f251ca4fbd591f60ad9a363777197cfd0746788a1c23854abbbe948bb6b",
            "source": "kam193",
            "versions": [
                "0.2.1",
                "0.2.2",
                "0.2.5",
                "0.2.6"
            ],
            "modified_time": "2025-05-09T20:14:13Z",
            "import_time": "2025-12-10T21:38:57.543740644Z"
        },
        {
            "id": "RLUA-2026-00425",
            "sha256": "c8ee98ac9e79a9222adb2248cc6ed6d4c35f32b5ebe9a3a2b9f68a09b8140606",
            "source": "reversing-labs",
            "modified_time": "2026-03-18T12:15:03Z",
            "import_time": "2026-03-19T12:19:54.929393922Z"
        }
    ]
}
References
Credits

Affected packages

PyPI / initer

Package

Affected ranges

Affected versions

0.*
0.2.1
0.2.2
0.2.5
0.2.6

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/initer/MAL-2025-6524.json"