MAL-2026-774

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/adminbypasser/MAL-2026-774.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2026-774
Published
2026-02-06T01:15:08Z
Modified
2026-02-06T01:51:05.225644Z
Summary
Malicious code in adminbypasser (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (867991d0e6c74f15c2f231c002867172a4e03044a328676cf9b2ec07a7e48f68)

Package silently downloads remote code and adds its execution to the autostart. During analysis, the remote domain no longer existed.


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2026-02-old-adminbypasser

Reasons (based on the campaign):

  • Downloads and executes a remote malicious script.

  • peristence-autorun

Database specific
{
    "malicious-packages-origins": [
        {
            "id": "pypi/2026-02-old-adminbypasser/adminbypasser",
            "import_time": "2026-02-06T01:38:12.986599338Z",
            "modified_time": "2026-02-06T01:15:08.735401Z",
            "sha256": "867991d0e6c74f15c2f231c002867172a4e03044a328676cf9b2ec07a7e48f68",
            "source": "kam193",
            "versions": [
                "1.0.1",
                "1.0.2",
                "1.0.3",
                "1.0.4",
                "1.0.5",
                "1.0.6",
                "1.0.7",
                "1.0.8",
                "2.0.1"
            ]
        }
    ],
    "iocs": {
        "urls": [
            "https://jackass.ml/raw"
        ]
    }
}
References
Credits

Affected packages

PyPI / adminbypasser

Package

Affected ranges

Affected versions

1.*
1.0.1
1.0.2
1.0.3
1.0.4
1.0.5
1.0.6
1.0.7
1.0.8
2.*
2.0.1

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/adminbypasser/MAL-2026-774.json"