MAL-2025-999

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/utilitypyfunc/MAL-2025-999.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2025-999
Published
2024-12-17T19:42:36Z
Modified
2026-03-19T12:58:00.393382Z
Summary
Malicious code in utilitypyfunc (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (2aaf64ae76493cf55c8b9e418bc3408f9e309b5c6a590a2ad528beb5ae8dbcc0)

Importing the package starts the thread that gets and executes code from the remote server. The package description suggests a rather spam than malicious intentions.


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2024-12-utilitypyfunc

Reasons (based on the campaign):

  • The package contains code to execute remote commands (probably limited to a specific set) on the victim's machine.
Database specific
{
    "malicious-packages-origins": [
        {
            "versions": [
                "0.1.0",
                "0.3.0",
                "0.4.0",
                "0.5.0"
            ],
            "sha256": "5c786b4ce5bf307c25e235c32f74228e5646de611321a40769c54ad2898b9bee",
            "id": "RLMA-2025-00540",
            "import_time": "2025-02-03T18:38:10.109550246Z",
            "modified_time": "2025-02-03T17:08:01Z",
            "source": "reversing-labs"
        },
        {
            "ranges": [
                {
                    "type": "ECOSYSTEM",
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ]
                }
            ],
            "sha256": "4503890a38a516040cbfd9f29a48ca5a8447c1609931303d2a0680ca50d950b7",
            "id": "pypi/2024-12-utilitypyfunc/utilitypyfunc",
            "import_time": "2025-12-02T22:30:55.698260767Z",
            "modified_time": "2024-12-17T19:42:36Z",
            "source": "kam193"
        },
        {
            "ranges": [
                {
                    "type": "ECOSYSTEM",
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ]
                }
            ],
            "sha256": "2aaf64ae76493cf55c8b9e418bc3408f9e309b5c6a590a2ad528beb5ae8dbcc0",
            "id": "pypi/2024-12-utilitypyfunc/utilitypyfunc",
            "import_time": "2025-12-02T23:07:18.743314544Z",
            "modified_time": "2024-12-17T19:42:36Z",
            "source": "kam193"
        },
        {
            "versions": [
                "0.1.0",
                "0.3.0",
                "0.4.0",
                "0.5.0"
            ],
            "sha256": "07b7c89d3feab6954ed0dc393cb14d5736baeaf3acf4ce79d42cff2cdaab48c5",
            "id": "pypi/2024-12-utilitypyfunc/utilitypyfunc",
            "import_time": "2025-12-10T21:38:57.918440187Z",
            "modified_time": "2024-12-17T19:42:36Z",
            "source": "kam193"
        },
        {
            "sha256": "f5b638434718ba496f959552b756ae67c4b57b48d32d54c22170ca51aa52c341",
            "id": "RLUA-2026-00880",
            "import_time": "2026-03-19T12:20:39.551516061Z",
            "modified_time": "2026-03-18T12:20:05Z",
            "source": "reversing-labs"
        }
    ]
}
References
Credits

Affected packages

PyPI / utilitypyfunc

Package

Affected ranges

Affected versions

0.*
0.1.0
0.3.0
0.4.0
0.5.0

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/utilitypyfunc/MAL-2025-999.json"