{"id":"MAL-2026-3050","summary":"Malicious code in robase-fast-install (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (eb36bd6222d998fae305e6200dff6413fec375765d7b81876e8041b72101c7ef)\nDuring installation package downloads and runs a malicious executable. Likely continuation of 2026-03-rowrap.\n\nThe campaign is built over a malicious Roblox API wrapper. The roboat[.]pro (later robase[.]app) domain advertises a wrapper that is either directly malicious (as roboat collected in the campaign 2026-03-rowrap) or uses a malicious dependencies (like roboat-utils). New versions are published simultaneously with malicious dependencies and quickly removed. Another advertisement channel is https://github.com/Addi9000/roboat referencing two active contributors: https://github.com/Addi9000 and https://github.com/RoCruise\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2026-03-roboat-addition\n\n\nReasons (based on the campaign):\n\n\n - The package overrides the install command in setup.py to execute malicious code during installation.\n\n\n - Downloads and executes a remote executable.\n\n\n - The malicious code is intentionally included in a dependency of the package\n\n\n - malware\n\n\n - clones-real-package\n","modified":"2026-04-26T17:36:37.664559Z","published":"2026-04-26T16:51:54Z","database_specific":{"malicious-packages-origins":[{"sha256":"eb36bd6222d998fae305e6200dff6413fec375765d7b81876e8041b72101c7ef","source":"kam193","id":"pypi/2026-03-roboat-addition/robase-fast-install","versions":["2.3.0"],"import_time":"2026-04-26T17:18:12.840073896Z","modified_time":"2026-04-26T16:52:32.494044Z"}],"iocs":{"domains":["jolly-violet-def9.staraledreamer.workers.dev","holy-sun-41ff.staraledreamer.workers.dev","spring-math-9df3.aledreamsaledreams2.workers.dev","i-like-boys.com","femboy.rich"],"urls":["https://jolly-violet-def9.staraledreamer.workers.dev/DDDD.exe","https://holy-sun-41ff.staraledreamer.workers.dev/gore.vbs","https://github.com/betonme27/flies/releases/download/a/s22s.zhr","https://dawn-thunder-f821.staraledreamer.workers.dev/gore.vbs","https://green-shadow-38d7.aledreamsaledreams2.workers.dev/tree.vbs","https://spring-math-9df3.aledreamsaledreams2.workers.dev/winre.bat","https://github.com/aledreamsaledreqms-source/frakenstein/raw/refs/heads/main/tree.vbs","https://lingering-field-4351.aledreamer1234.workers.dev/yy.bat","https://github.com/aledreamsaledreqms-source/frakenstein/raw/refs/heads/main/ee.exe","https://i-like-boys.com/tree.vbs","https://femboy.rich/imafaggot.vbs","https://raw.githubusercontent.com/vdreamer/www/refs/heads/main/rabbit.exe"]}},"references":[{"type":"EVIDENCE","url":"https://www.virustotal.com/gui/file/9f14d239ab8f1289bc7aedeb67d3d72b467ee6c11b201890ab14c5c4f7c175d2/detection"},{"type":"EVIDENCE","url":"https://www.virustotal.com/gui/file/48b108261d5de97a42eff81cf1a60a32286f72bf8b5f130959e0daa86b783608"},{"type":"EVIDENCE","url":"https://www.virustotal.com/gui/file/ef20289b52ab23ec23c5ff885a2293523ce8456fb00e3d67f1b084c28f7d282a/detection"},{"type":"WEB","url":"https://github.com/Addi9000/roboat/blob/331166c8ea3bd080f08fe6d571202e3b47017ed7/README.md#L31"},{"type":"WEB","url":"https://github.com/Addi9000/roboat/commit/331166c8ea3bd080f08fe6d571202e3b47017ed7"},{"type":"WEB","url":"https://github.com/Addi9000"},{"type":"WEB","url":"https://github.com/RoCruise"},{"type":"WEB","url":"https://www.roboat.pro/"},{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/robase-fast-install"}],"affected":[{"package":{"name":"robase-fast-install","ecosystem":"PyPI","purl":"pkg:pypi/robase-fast-install"},"versions":["2.3.0"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/robase-fast-install/MAL-2026-3050.json"}}],"schema_version":"1.7.5","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"REPORTER"}]}