{"id":"MAL-2025-3741","summary":"Malicious code in dial-xl (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (129b71dc44955e560cd56ff53e0be19aced751699016fa96cb04ee75d2e76e3b)\nPackages that seem to be created by a legit bug bounty hunter. Designed to look like created by different organisations, they contain a couple of data exfiltration (including all env variables) and potential remote code execution (though the URL seems not to serve any code).\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2025-05-sl4x01\n\n\nReasons (based on the campaign):\n\n\n - The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.\n\n\n - exfiltration-env-variables\n\n\n - impersonation\n\n## Source: ossf-package-analysis (0febe63d78b1149e91af60c89ae73e492d43cb35f04dc6aaee2c4048987081a9)\nThe OpenSSF Package Analysis project identified 'dial-xl' @ 0.0.1 (pypi) as malicious.\n\nIt is considered malicious because:\n\n- The package executes one or more commands associated with malicious behavior.\n","modified":"2025-12-12T20:39:15.611697Z","published":"2025-05-10T13:41:29Z","database_specific":{"iocs":{"domains":["sl4x0.xyz"]},"malicious-packages-origins":[{"source":"ossf-package-analysis","import_time":"2025-05-12T00:25:55.382499014Z","versions":["0.0.1"],"modified_time":"2025-05-10T13:41:29Z","sha256":"0febe63d78b1149e91af60c89ae73e492d43cb35f04dc6aaee2c4048987081a9"},{"source":"reversing-labs","import_time":"2025-05-22T14:06:35.135348536Z","id":"RLMA-2025-02567","versions":["0.0.1"],"modified_time":"2025-05-22T12:33:30Z","sha256":"981cfe7e3f073f4617d3753692488e7d648638062ce86107e80053f7e42b27bf"},{"ranges":[{"events":[{"introduced":"0"}],"type":"ECOSYSTEM"}],"source":"kam193","import_time":"2025-12-02T22:30:55.099069131Z","id":"pypi/2025-05-sl4x01/dial-xl","modified_time":"2025-05-10T17:59:53Z","sha256":"bbee7f1a70bb8bd38a215ed7b6ed02042387824942682e3caedcd4dbe255ac29"},{"ranges":[{"events":[{"introduced":"0"}],"type":"ECOSYSTEM"}],"source":"kam193","import_time":"2025-12-02T23:07:18.110205419Z","id":"pypi/2025-05-sl4x01/dial-xl","modified_time":"2025-05-10T17:59:53Z","sha256":"129b71dc44955e560cd56ff53e0be19aced751699016fa96cb04ee75d2e76e3b"},{"source":"kam193","import_time":"2025-12-10T21:38:57.39546625Z","id":"pypi/2025-05-sl4x01/dial-xl","versions":["0.0.1"],"modified_time":"2025-05-10T17:59:53Z","sha256":"6998be6df530663dae02f1db20706272aefdaa812605fb740493e5f41d63c126"}]},"references":[{"type":"WEB","url":"https://github.com/sl4x0"},{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/dial-xl"}],"affected":[{"package":{"name":"dial-xl","ecosystem":"PyPI","purl":"pkg:pypi/dial-xl"},"versions":["0.0.1"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/dial-xl/MAL-2025-3741.json"}}],"schema_version":"1.7.3","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"]},{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"REPORTER"},{"name":"OpenSSF: Package Analysis","contact":["https://github.com/ossf/package-analysis","https://openssf.slack.com/channels/package_analysis"],"type":"FINDER"},{"name":"ReversingLabs","contact":["https://www.reversinglabs.com"],"type":"FINDER"}]}