MAL-2025-928

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/gandon-pidar1/MAL-2025-928.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2025-928
Published
2024-08-05T22:25:51Z
Modified
2026-03-19T12:53:26.687462Z
Summary
Malicious code in gandon-pidar1 (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (4ac6e5875e2e378713032cdf0e35f5eef05d5f3967b4ec5e8c57759adb128b21)

Package uses the template from https://github.com/thegoodhackertv/malpip to explore building malicious PyPI packages.


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: SCRIPT_KIDDIE-thegoodhacker-paquete

Reasons (based on the campaign):

  • The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.

  • The package overrides the install command in setup.py to execute malicious code during installation.

  • Package uses simple pre-prepared tools to create a low-quality malicious action.

Database specific
{
    "malicious-packages-origins": [
        {
            "import_time": "2025-02-03T18:38:06.355199934Z",
            "modified_time": "2025-02-03T17:07:23Z",
            "sha256": "459830a44bb5c0991c28d4df53b69eaf4c4e7ae746a02e5967e418df4e04865a",
            "source": "reversing-labs",
            "versions": [
                "1.0.0"
            ],
            "id": "RLMA-2025-00467"
        },
        {
            "import_time": "2025-12-02T22:30:55.213052058Z",
            "modified_time": "2024-08-05T22:25:51Z",
            "sha256": "5a56dbc76ac6858e10e5fe22e5dae8207b19403e578ac85fc1bebe80e96cbaf4",
            "source": "kam193",
            "ranges": [
                {
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ],
                    "type": "ECOSYSTEM"
                }
            ],
            "id": "pypi/SCRIPT_KIDDIE-thegoodhacker-paquete/gandon-pidar1"
        },
        {
            "import_time": "2025-12-02T23:07:18.237455303Z",
            "modified_time": "2024-08-05T22:25:51Z",
            "sha256": "4ac6e5875e2e378713032cdf0e35f5eef05d5f3967b4ec5e8c57759adb128b21",
            "source": "kam193",
            "ranges": [
                {
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ],
                    "type": "ECOSYSTEM"
                }
            ],
            "id": "pypi/SCRIPT_KIDDIE-thegoodhacker-paquete/gandon-pidar1"
        },
        {
            "import_time": "2025-12-10T21:38:57.502723243Z",
            "modified_time": "2024-08-05T22:25:51Z",
            "sha256": "fe8e8666110a162143a582dbfc5a6c6acf8d25ac937edfa9a9aaa8d32d28f10e",
            "source": "kam193",
            "versions": [
                "1.0.0"
            ],
            "id": "pypi/SCRIPT_KIDDIE-thegoodhacker-paquete/gandon-pidar1"
        },
        {
            "import_time": "2026-03-19T12:19:47.455424372Z",
            "modified_time": "2026-03-18T12:14:10Z",
            "sha256": "cd42cc227905f8f63b388c8f947c3c0cfd337827cd9c42da299d5b557f7682df",
            "source": "reversing-labs",
            "id": "RLUA-2026-00346"
        }
    ],
    "iocs": {
        "urls": [
            "https://github.com/thegoodhackertv/malpip"
        ]
    }
}
References
Credits

Affected packages

PyPI / gandon-pidar1

Package

Affected ranges

Affected versions

1.*
1.0.0

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/gandon-pidar1/MAL-2025-928.json"