Analyze your own packages withvet GitHub

k7eel2-ss@0.1.1

Suspicious
Analyzed at:8/21/2025, 1:37:11 AM
Source:https://files.pythonhosted.org/packages/fc/c8/8718f47e2b2a33f346f09a777d0a0448b69458d8952d57e5014d36295a48/k7eel2_ss-0.1.1-py3-none-any.whl
SHA256:f62e78db655927f5954f5ed3c450620b205dd4ae6cab288764c5ade5d070aa17
Confidence:Medium
Summary

This analysis was performed using vet and SafeDep Cloud Malicious Package Analysis. Integrate with GitHub using vet-action GitHub Action.

The package downloads and executes an executable from a hardcoded URL, a common malware technique. High confidence it's malicious.

Details

The package k7eel2-ss contains code that downloads and executes an executable file from a hardcoded URL (https://github.com/deprosinal/legendary-funicular/raw/refs/heads/main/helo.exe). This behavior is observed in both k7eel/__init__.py and k7eel/main.py. The downloaded file is saved as randar.exe and then executed using subprocess.run. Downloading and executing arbitrary executables is a common technique used by malware to install itself or download additional payloads. The use of shell=True in k7eel/__init__.py also introduces a potential command injection vulnerability, although the filename is hardcoded. This combination of behaviors strongly suggests that the package is malicious.