MAL-2026-2542

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/databasetrace/MAL-2026-2542.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2026-2542
Published
2026-04-10T21:22:24Z
Modified
2026-04-12T22:19:20.460626Z
Summary
Malicious code in databasetrace (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (144ff96bc84711f9be4c580e9d4b4cdcc650d9faf2f6ca9008ca34234d888805)

During installation package downloads and runs a malicious executable. Likely continuation of 2026-03-rowrap.

The campaign is built over a malicious Roblox API wrapper. The roboat[.]pro (later robase[.]app) domain advertises a wrapper that is either directly malicious (as roboat collected in the campaign 2026-03-rowrap) or uses a malicious dependencies (like roboat-utils). New versions are published simultaneously with malicious dependencies and quickly removed. Another advertisement channel is https://github.com/Addi9000/roboat referencing two active contributors: https://github.com/Addi9000 and https://github.com/RoCruise


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2026-03-roboat-addition

Reasons (based on the campaign):

  • The package overrides the install command in setup.py to execute malicious code during installation.

  • Downloads and executes a remote executable.

  • The malicious code is intentionally included in a dependency of the package

  • malware

  • clones-real-package

Database specific
{
    "iocs": {
        "domains": [
            "jolly-violet-def9.staraledreamer.workers.dev",
            "holy-sun-41ff.staraledreamer.workers.dev",
            "spring-math-9df3.aledreamsaledreams2.workers.dev"
        ],
        "urls": [
            "https://jolly-violet-def9.staraledreamer.workers.dev/DDDD.exe",
            "https://holy-sun-41ff.staraledreamer.workers.dev/gore.vbs",
            "https://github.com/betonme27/flies/releases/download/a/s22s.zhr",
            "https://dawn-thunder-f821.staraledreamer.workers.dev/gore.vbs",
            "https://green-shadow-38d7.aledreamsaledreams2.workers.dev/tree.vbs",
            "https://spring-math-9df3.aledreamsaledreams2.workers.dev/winre.bat",
            "https://github.com/aledreamsaledreqms-source/frakenstein/raw/refs/heads/main/tree.vbs",
            "https://lingering-field-4351.aledreamer1234.workers.dev/yy.bat"
        ]
    },
    "malicious-packages-origins": [
        {
            "id": "pypi/2026-03-roboat-addition/databasetrace",
            "sha256": "3595549c5e7d83e6c4d0b227fa42882622762067b42be28b3c4943f37eb98201",
            "source": "kam193",
            "versions": [
                "0.0.5",
                "0.0.6",
                "0.0.7"
            ],
            "modified_time": "2026-04-10T21:22:24.825439Z",
            "import_time": "2026-04-10T21:47:38.804507659Z"
        },
        {
            "id": "pypi/2026-03-roboat-addition/databasetrace",
            "sha256": "6f5d3117e59dfe219ba8a1ea737a74da80cb60a5ee31610f90511cf995af2913",
            "source": "kam193",
            "versions": [
                "0.0.5",
                "0.0.6",
                "0.0.7"
            ],
            "modified_time": "2026-04-10T21:22:24.825439Z",
            "import_time": "2026-04-12T21:46:35.808558816Z"
        },
        {
            "id": "pypi/2026-03-roboat-addition/databasetrace",
            "sha256": "144ff96bc84711f9be4c580e9d4b4cdcc650d9faf2f6ca9008ca34234d888805",
            "source": "kam193",
            "versions": [
                "0.0.5",
                "0.0.6",
                "0.0.7"
            ],
            "modified_time": "2026-04-10T21:22:24.825439Z",
            "import_time": "2026-04-12T22:12:37.185292184Z"
        }
    ]
}
References
Credits

Affected packages

PyPI / databasetrace

Package

Affected ranges

Affected versions

0.*
0.0.5
0.0.6
0.0.7

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/databasetrace/MAL-2026-2542.json"