MAL-2026-1080

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/hashtools32/MAL-2026-1080.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2026-1080
Published
2026-02-27T19:50:28Z
Modified
2026-02-28T06:28:49.222402Z
Summary
Malicious code in hashtools32 (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (689514b83cd6496b0a4213d26325e73cd2c4f0e19128b969d19797bcdd4b131d)

During import, the package attempts to exfiltrate sensitive Telegram session files


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2026-02-hashtools32

Reasons (based on the campaign):

  • exfiltration-credentials

  • files-exfiltration

Database specific
{
    "malicious-packages-origins": [
        {
            "source": "kam193",
            "sha256": "689514b83cd6496b0a4213d26325e73cd2c4f0e19128b969d19797bcdd4b131d",
            "versions": [
                "1.0.0",
                "2.1.0"
            ],
            "import_time": "2026-02-27T20:11:38.237599399Z",
            "modified_time": "2026-02-27T19:50:28.642425Z",
            "id": "pypi/2026-02-hashtools32/hashtools32"
        }
    ],
    "iocs": {
        "ips": [
            "83.147.255.125"
        ]
    }
}
References
Credits

Affected packages

PyPI / hashtools32

Package

Affected ranges

Affected versions

1.*
1.0.0
2.*
2.1.0

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/hashtools32/MAL-2026-1080.json"