-= Per source details. Do not edit below this line.=-
During installation package downloads and runs a malicious executable. Likely continuation of 2026-03-rowrap.
The campaign is built over a malicious Roblox API wrapper. The roboat[.]pro (later robase[.]app) domain advertises a wrapper that is either directly malicious (as roboat collected in the campaign 2026-03-rowrap) or uses a malicious dependencies (like roboat-utils). New versions are published simultaneously with malicious dependencies and quickly removed. Another advertisement channel is https://github.com/Addi9000/roboat referencing two active contributors: https://github.com/Addi9000 and https://github.com/RoCruise
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2026-03-roboat-addition
Reasons (based on the campaign):
The package overrides the install command in setup.py to execute malicious code during installation.
Downloads and executes a remote executable.
The malicious code is intentionally included in a dependency of the package
malware
clones-real-package
{
"iocs": {
"domains": [
"jolly-violet-def9.staraledreamer.workers.dev",
"holy-sun-41ff.staraledreamer.workers.dev",
"spring-math-9df3.aledreamsaledreams2.workers.dev",
"i-like-boys.com",
"femboy.rich"
],
"urls": [
"https://jolly-violet-def9.staraledreamer.workers.dev/DDDD.exe",
"https://holy-sun-41ff.staraledreamer.workers.dev/gore.vbs",
"https://github.com/betonme27/flies/releases/download/a/s22s.zhr",
"https://dawn-thunder-f821.staraledreamer.workers.dev/gore.vbs",
"https://green-shadow-38d7.aledreamsaledreams2.workers.dev/tree.vbs",
"https://spring-math-9df3.aledreamsaledreams2.workers.dev/winre.bat",
"https://github.com/aledreamsaledreqms-source/frakenstein/raw/refs/heads/main/tree.vbs",
"https://lingering-field-4351.aledreamer1234.workers.dev/yy.bat",
"https://github.com/aledreamsaledreqms-source/frakenstein/raw/refs/heads/main/ee.exe",
"https://i-like-boys.com/tree.vbs",
"https://femboy.rich/imafaggot.vbs",
"https://raw.githubusercontent.com/vdreamer/www/refs/heads/main/rabbit.exe",
"https://github.com/aledreamer1234-lgtm/555/raw/refs/heads/main/output.exe"
]
},
"malicious-packages-origins": [
{
"import_time": "2026-04-28T22:24:35.172085629Z",
"id": "pypi/2026-03-roboat-addition/robase-start",
"versions": [
"2.4.0"
],
"source": "kam193",
"modified_time": "2026-04-28T21:56:07.053865Z",
"sha256": "827cc431e55560fd4944d6b7fa6c47e6adb5027a75fe949642630843b0c8702e"
},
{
"import_time": "2026-04-28T22:49:44.428162763Z",
"id": "pypi/2026-03-roboat-addition/robase-start",
"versions": [
"2.4.0"
],
"source": "kam193",
"modified_time": "2026-04-28T21:56:07.053865Z",
"sha256": "2d33ccb007d869658070b01548db4e7f96c9191e013525e4df15b515abcf3f97"
}
]
}