{"id":"MAL-2026-3659","summary":"Malicious code in rich-util (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (cc191d72f2f92d966897d0f635b53afecd9a62e8b63de13fff125a00377fcb63)\nPackage installs persistent malware acting as Rat, with the focus of stealing data and modifying copied cryptowallet addresses.\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2026-05-py-requests\n\n\nReasons (based on the campaign):\n\n\n - rat\n\n\n - typosquatting\n\n\n - persistence\n\n\n - Downloads and executes a remote malicious script.\n\n\n - crypto-related\n\n\n - clipboard-modify\n\n\n - exfiltration-browser-data\n\n\n - exfiltration-crypto\n\n\n - infostealer\n","modified":"2026-05-13T15:48:29.457933Z","published":"2026-05-13T15:24:25Z","database_specific":{"malicious-packages-origins":[{"versions":["0.218.10"],"source":"kam193","id":"pypi/2026-05-py-requests/rich-util","import_time":"2026-05-13T15:29:45.012238878Z","modified_time":"2026-05-13T15:24:25.704041Z","sha256":"cc191d72f2f92d966897d0f635b53afecd9a62e8b63de13fff125a00377fcb63"}],"iocs":{"urls":["http://8.217.75.147:3000/payload","http://8.217.75.147:3000/download/tg_rat.py"],"ips":["8.217.75.147"]}},"references":[{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/rich-util"}],"affected":[{"package":{"name":"rich-util","ecosystem":"PyPI","purl":"pkg:pypi/rich-util"},"versions":["0.218.10"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/rich-util/MAL-2026-3659.json"}}],"schema_version":"1.7.5","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"REPORTER"}]}