MAL-2026-3698

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/trickery/MAL-2026-3698.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2026-3698
Published
2026-05-13T18:41:37Z
Modified
2026-05-13T20:22:52.321873Z
Summary
Malicious code in trickery (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (3ad5df28c8d5f5afa377d6b54a7eac1d3110610783c7e62fbd084a0bd49baac5)

Package contains code to install a backdoor - and additionally to a user-controlled backdoor, it also installs the second, with own C2 server. It's not automatically activated. Once started, it can execute commands from C2 and exfiltrate data.


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2025-06-old-trickery

Reasons (based on the campaign):

  • backdoor

  • files-exfiltration

  • peristence-autorun

  • Downloads and executes a remote malicious script.

  • The package contains code to execute remote commands (probably limited to a specific set) on the victim's machine.

Database specific
{
    "iocs": {
        "urls": [
            "https://github.com/cipher234/socioware/raw/main/config.pyw",
            "https://github.com/cipher234/socioware/raw/main/socio_req",
            "https://github.com/socioware1/trickery/raw/refs/heads/main/archive/trickery.rar"
        ]
    },
    "malicious-packages-origins": [
        {
            "sha256": "3ad5df28c8d5f5afa377d6b54a7eac1d3110610783c7e62fbd084a0bd49baac5",
            "import_time": "2026-05-13T20:11:04.545856048Z",
            "modified_time": "2026-05-13T18:41:37.827451Z",
            "versions": [
                "1.0.0",
                "1.0.1"
            ],
            "id": "pypi/2025-06-old-trickery/trickery",
            "source": "kam193"
        }
    ]
}
References
Credits

Affected packages

PyPI / trickery

Package

Affected ranges

Affected versions

1.*
1.0.0
1.0.1

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/trickery/MAL-2026-3698.json"