Analyze your own packages withvet GitHub

paypal-invoicing@1.0.1

Malicious
Verified
Analyzed at:7/13/2025, 4:23:43 PM
Source:https://registry.npmjs.org/paypal-invoicing/-/paypal-invoicing-1.0.1.tgz
SHA256:3d8705e0b02010c2fcc23fae24bce1b4c8a699737268280e8dadd1345c4d06a1
Confidence:High
Summary

This analysis was performed using vet and SafeDep Cloud Malicious Package Analysis. Integrate with GitHub using vet-action GitHub Action.

Note: This report is updated by a verification record

Malicious package. Collects system info, exfiltrates data to hardcoded IP, runs code during preinstall, and attempts to hide activity.

Verification Record

The package is marked as malware by OSV: MAL-2025-6192 with source: ghsa-malware

Malicious package. Collects system info, exfiltrates data to hardcoded IP, runs code during preinstall, and attempts to hide activity.


-= Per source details. Do not edit below this line.=-

Source: ghsa-malware (bd66aabb4b40f49dc7ef8bda42a33f705beb6def65601b8fd3025c7e055bc2e6)

Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

Details

Note: This report is updated by a verification record

The package paypal-invoicing version 1.0.1 is highly suspicious and likely malicious. The index.js file contains code that collects system information (public IP, hostname, OS details, local IP, username, current directory) and attempts to exfiltrate it to a hardcoded IP address (http://54.173.15.59:8080/jpd.php) via GET and POST requests. It also attempts to exfiltrate data via a WebSocket connection. Furthermore, the package executes node index.js during the preinstall phase, which is unusual and indicative of malicious intent. The code also attempts to suppress logging during the preinstall phase, making detection more difficult. These behaviors strongly suggest that the package is designed to steal sensitive information and potentially compromise the user's system.