MAL-2025-192685

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/hooktest-fin/MAL-2025-192685.json
JSON Data
https://api.test.osv.dev/v1/vulns/MAL-2025-192685
Published
2025-12-21T14:09:21Z
Modified
2025-12-21T14:46:14.561113Z
Summary
Malicious code in hooktest-fin (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (87e6fba5c0ac4b5359cb360a5dbf68404d0b8559bd94a9f4c33fdad09559b241)

During installation, a script to execute remote commands through a Discord bot is installed, ensuring its persistence over reboots


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2025-11-hooktest1

Reasons (based on the campaign):

  • The package overrides the install command in setup.py to execute malicious code during installation.

  • The package contains code to execute remote commands (probably limited to a specific set) on the victim's machine.

  • rat

Database specific
{
    "malicious-packages-origins": [
        {
            "id": "pypi/2025-11-hooktest1/hooktest-fin",
            "modified_time": "2025-12-21T14:09:21.67196Z",
            "source": "kam193",
            "sha256": "87e6fba5c0ac4b5359cb360a5dbf68404d0b8559bd94a9f4c33fdad09559b241",
            "versions": [
                "0.1.1"
            ],
            "import_time": "2025-12-21T14:37:49.460199745Z"
        }
    ]
}
References
Credits

Affected packages

PyPI / hooktest-fin

Package

Affected ranges

Affected versions

0.*

0.1.1

Database specific

source

"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/hooktest-fin/MAL-2025-192685.json"