MAL-2026-189

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/oncecall/MAL-2026-189.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2026-189
Published
2026-01-10T13:00:33Z
Modified
2026-01-10T14:08:19.291518Z
Summary
Malicious code in oncecall (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (30fc3993415d365e03d500864542d91d6c6d87af8b6125765af3ba4a5ee059f6)

Package silently downloads and executes an infostealer


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2026-01-oncecall

Reasons (based on the campaign):

  • infostealer

  • Downloads and executes a remote executable.

  • obfuscation

Database specific
{
    "malicious-packages-origins": [
        {
            "versions": [
                "0.1.0"
            ],
            "id": "pypi/2026-01-oncecall/oncecall",
            "modified_time": "2026-01-10T13:00:33.670258Z",
            "import_time": "2026-01-10T13:41:55.428238089Z",
            "sha256": "30fc3993415d365e03d500864542d91d6c6d87af8b6125765af3ba4a5ee059f6",
            "source": "kam193"
        }
    ],
    "iocs": {
        "domains": [
            "python-modules.netlify.app",
            "still-paper-8832.samjango.workers.dev"
        ],
        "urls": [
            "https://python-modules.netlify.app/module1",
            "https://python-modules.netlify.app/module2"
        ]
    }
}
References
Credits

Affected packages

PyPI / oncecall

Package

Affected ranges

Affected versions

0.*

0.1.0

Database specific

source

"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/oncecall/MAL-2026-189.json"