{"id":"MAL-2024-10152","summary":"Malicious code in redis-di-processor (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (d6942290379335757f0deff6d17e2490cd1b47f426b3f1fb533766ab804aa6cb)\nThe package is designed to exfiltrate basic data, like hostname and OS details, as well as collect information about the stacktrace it's imported from.\n\n\n---\n\nCategory: PROBABLY_PENTEST - Packages looking like typical pentest packages, but also anything that looks like testing, exploring pre-prepared kits, research & co, with clearly low-harm possibilities.\n\n\nCampaign: 2024-08-moti-analytics\n\n\nReasons (based on the campaign):\n\n\n - The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.\n","modified":"2026-03-19T12:56:16.755685Z","published":"2024-08-23T21:20:09Z","database_specific":{"malicious-packages-origins":[{"id":"RLMA-2024-09114","modified_time":"2024-10-16T14:49:48Z","import_time":"2024-10-24T00:57:08.16677585Z","source":"reversing-labs","versions":["0.1.8"],"sha256":"8807be7545a5c56b457c5b2b74d367132300b3876c053991c31c906fd9aabff0"},{"id":"pypi/2024-08-moti-analytics/redis-di-processor","modified_time":"2024-08-23T21:20:09Z","import_time":"2025-12-02T22:30:56.365110437Z","source":"kam193","ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"sha256":"33706cbb6110242aa641456e01c0b13fd33512ef13286633442b6828f5561205"},{"id":"pypi/2024-08-moti-analytics/redis-di-processor","modified_time":"2024-08-23T21:20:09Z","import_time":"2025-12-02T23:07:19.552458957Z","source":"kam193","ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"sha256":"d6942290379335757f0deff6d17e2490cd1b47f426b3f1fb533766ab804aa6cb"},{"id":"pypi/2024-08-moti-analytics/redis-di-processor","modified_time":"2024-08-23T21:20:09Z","import_time":"2025-12-10T21:38:58.654611042Z","source":"kam193","versions":["0.1.8"],"sha256":"ebbd6b1490989148102e50444b4e5143aab85d6958579d5a9c18ffd40b0dcdbd"},{"id":"RLUA-2026-00691","modified_time":"2026-03-18T12:18:03Z","import_time":"2026-03-19T12:20:21.064056374Z","source":"reversing-labs","sha256":"bb92be3bce441a380e0b950a99462cffd5edf1382e82af2fa76c18870667d632"}]},"references":[{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/redis-di-processor"}],"affected":[{"package":{"name":"redis-di-processor","ecosystem":"PyPI","purl":"pkg:pypi/redis-di-processor"},"versions":["0.1.8"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/redis-di-processor/MAL-2024-10152.json"}}],"schema_version":"1.7.5","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"]},{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"ANALYST"},{"name":"ReversingLabs","contact":["https://www.reversinglabs.com"],"type":"FINDER"}]}