MAL-2025-6565

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/pipmodule83/MAL-2025-6565.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2025-6565
Published
2025-07-05T11:05:55Z
Modified
2026-03-19T12:55:22.624420Z
Summary
Malicious code in pipmodule83 (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (95b01ea01a7fd1ff5e52491e6b143aa98f45a6f331814222fe38e76ad3ac0863)

If run as a module, the package downloads and executes a remote script. At the time of check, the remote script was just opening a popup; thus it's not classified as clearly malicious.

Through the package description related to "cirhenly" package, which was uploaded by "0x92nw" - see campaign 2025-07-0x92nw


Category: PROBABLY_PENTEST - Packages looking like typical pentest packages, but also anything that looks like testing, exploring pre-prepared kits, research & co, with clearly low-harm possibilities.

Campaign: 2025-07-pipmodule83

Reasons (based on the campaign):

  • Downloads and executes a remote malicious script.
Database specific
{
    "iocs": {
        "domains": [
            "jjjy-9mb.pages.dev"
        ],
        "urls": [
            "https://jjjy-9mb.pages.dev/j.vbs"
        ]
    },
    "malicious-packages-origins": [
        {
            "source": "reversing-labs",
            "id": "RLMA-2025-03662",
            "modified_time": "2025-07-31T19:16:02Z",
            "sha256": "a3ef16c222720f6936569e3cb54d57c916954c86ec5f95495414c25af1041c40",
            "versions": [
                "1.0.2"
            ],
            "import_time": "2025-08-01T10:07:13.173040067Z"
        },
        {
            "source": "kam193",
            "id": "pypi/2025-07-pipmodule83/pipmodule83",
            "modified_time": "2025-07-05T11:05:55Z",
            "sha256": "7856b4f75afa0125606616ed3bf99110de22c8f90bad7ce4595cd05b241c47fb",
            "ranges": [
                {
                    "type": "ECOSYSTEM",
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ]
                }
            ],
            "import_time": "2025-12-02T22:30:56.298120554Z"
        },
        {
            "source": "kam193",
            "id": "pypi/2025-07-pipmodule83/pipmodule83",
            "modified_time": "2025-07-05T11:05:55Z",
            "sha256": "95b01ea01a7fd1ff5e52491e6b143aa98f45a6f331814222fe38e76ad3ac0863",
            "ranges": [
                {
                    "type": "ECOSYSTEM",
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ]
                }
            ],
            "import_time": "2025-12-02T23:07:19.486186676Z"
        },
        {
            "source": "kam193",
            "id": "pypi/2025-07-pipmodule83/pipmodule83",
            "modified_time": "2025-07-05T11:05:55Z",
            "sha256": "618aeb590e02926a184d2a0f61c2e3ce42d681a1b7c15a0438092ffb27759a41",
            "versions": [
                "1.0.2"
            ],
            "import_time": "2025-12-10T21:38:58.601570232Z"
        },
        {
            "source": "reversing-labs",
            "id": "RLUA-2026-00594",
            "modified_time": "2026-03-18T12:16:57Z",
            "sha256": "14044cfef2d72e831a96ef47086bab2cf9644d221de1c1447797e5b35b8de453",
            "import_time": "2026-03-19T12:20:12.374903245Z"
        }
    ]
}
References
Credits

Affected packages

PyPI / pipmodule83

Package

Affected ranges

Affected versions

1.*
1.0.2

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/pipmodule83/MAL-2025-6565.json"