mal-2025-1965
Vulnerability from ossf_malicious_packages
Published
2025-02-01 00:45
Modified
2025-12-11 09:27
Summary
Malicious code in asynchelpers (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (e262ab4b975a2de9c0216656ca3e760d84f3cdacb526340248dd476c31ddeb0d)

Importing the module starts (through init.py) the code that download, extracts and starts a remote executable. This has been identified by any.run as a AsyncRAT. The VirtusTotal detection rate was originally at the edge of false positive, but increased significantly during a few hours.


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2025-01-asynchelpers

Reasons (based on the campaign):

  • infostealer

  • Downloads and executes a remote executable.

  • malware


{
  "affected": [
    {
      "package": {
        "ecosystem": "PyPI",
        "name": "asynchelpers",
        "purl": "pkg:pypi/asynchelpers"
      },
      "versions": [
        "1.2.0"
      ]
    }
  ],
  "credits": [
    {
      "contact": [
        "https://github.com/kam193",
        "https://bad-packages.kam193.eu/"
      ],
      "name": "Kamil Ma\u0144kowski (kam193)"
    },
    {
      "contact": [
        "https://github.com/kam193",
        "https://bad-packages.kam193.eu/"
      ],
      "name": "Kamil Ma\u0144kowski (kam193)",
      "type": "REPORTER"
    },
    {
      "contact": [
        "https://www.reversinglabs.com"
      ],
      "name": "ReversingLabs",
      "type": "FINDER"
    }
  ],
  "database_specific": {
    "iocs": {
      "ips": [
        "104.194.151.19"
      ],
      "urls": [
        "https://github.com/asynchelpers/asynchelpers/raw/refs/heads/main/configs/main/security_profiles/functionality.zip"
      ]
    },
    "malicious-packages-origins": [
      {
        "id": "RLMA-2025-01200",
        "import_time": "2025-03-03T15:07:14.034410593Z",
        "modified_time": "2025-03-03T13:44:39Z",
        "sha256": "3abdfacd480ef37dda3fa5227b950c999e9d6332d4bf65b56e981752a0d4a055",
        "source": "reversing-labs",
        "versions": [
          "1.2.0"
        ]
      },
      {
        "id": "pypi/2025-01-asynchelpers/asynchelpers",
        "import_time": "2025-12-02T22:30:54.951211087Z",
        "modified_time": "2025-02-01T00:45:27Z",
        "ranges": [
          {
            "events": [
              {
                "introduced": "0"
              }
            ],
            "type": "ECOSYSTEM"
          }
        ],
        "sha256": "bc72d23ac15ca2bd56b6336b7999972ac306783bb0cacd59b7060304be22bf6e",
        "source": "kam193"
      },
      {
        "id": "pypi/2025-01-asynchelpers/asynchelpers",
        "import_time": "2025-12-02T23:07:17.990957583Z",
        "modified_time": "2025-02-01T00:45:27Z",
        "ranges": [
          {
            "events": [
              {
                "introduced": "0"
              }
            ],
            "type": "ECOSYSTEM"
          }
        ],
        "sha256": "e262ab4b975a2de9c0216656ca3e760d84f3cdacb526340248dd476c31ddeb0d",
        "source": "kam193"
      },
      {
        "id": "pypi/2025-01-asynchelpers/asynchelpers",
        "import_time": "2025-12-10T21:38:57.296565771Z",
        "modified_time": "2025-02-01T00:45:27Z",
        "sha256": "99d47d8c6d0c1ac235c1516350bc19073422bcf4c6b8f9b0e16e956a7e230d21",
        "source": "kam193",
        "versions": [
          "1.2.0"
        ]
      }
    ]
  },
  "details": "\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (e262ab4b975a2de9c0216656ca3e760d84f3cdacb526340248dd476c31ddeb0d)\nImporting the module starts (through __init__.py) the code that download, extracts and starts a remote executable. This has been identified by any.run as a AsyncRAT. The VirtusTotal detection rate was originally at the edge of false positive, but increased significantly during a few hours.\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2025-01-asynchelpers\n\n\nReasons (based on the campaign):\n\n\n - infostealer\n\n\n - Downloads and executes a remote executable.\n\n\n - malware\n",
  "id": "MAL-2025-1965",
  "modified": "2025-12-11T09:27:52Z",
  "published": "2025-02-01T00:45:27Z",
  "references": [
    {
      "type": "EVIDENCE",
      "url": "https://app.any.run/tasks/f4f95dff-ac96-47f1-bc14-76e2745ecb3d"
    },
    {
      "type": "EVIDENCE",
      "url": "https://www.virustotal.com/gui/file/265ef544887043fb158f2049a4e77ccf6119e28e3aebcde66b28db70795b5ee6"
    },
    {
      "type": "WEB",
      "url": "https://bad-packages.kam193.eu/pypi/package/asynchelpers"
    }
  ],
  "schema_version": "1.7.4",
  "summary": "Malicious code in asynchelpers (PyPI)"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…