MAL-2026-1437

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/flowpeek/MAL-2026-1437.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2026-1437
Published
2026-03-15T17:02:41Z
Modified
2026-03-15T18:05:50.705115Z
Summary
Malicious code in flowpeek (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (e79fec156ab781e041d49cebd6082ee113ef98ce53945dc1a949a3a8e96fa734)

During import, the code starts the embedded executable. This executable is an information stealer extracting sensitive data to a Discord channel.


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2026-03-flowfix

Reasons (based on the campaign):

  • obfuscation

  • infostealer

  • Downloads and executes a remote executable.

Database specific
{
    "iocs": {
        "domains": [
            "lustodyssey.com"
        ],
        "urls": [
            "https://lustodyssey.com/lustodysseysetup2.1.1.exe"
        ]
    },
    "malicious-packages-origins": [
        {
            "source": "kam193",
            "id": "pypi/2026-03-flowfix/flowpeek",
            "modified_time": "2026-03-15T17:02:41.75817Z",
            "sha256": "e79fec156ab781e041d49cebd6082ee113ef98ce53945dc1a949a3a8e96fa734",
            "versions": [
                "0.1.1"
            ],
            "import_time": "2026-03-15T17:44:00.762653875Z"
        }
    ]
}
References
Credits

Affected packages

PyPI / flowpeek

Package

Affected ranges

Affected versions

0.*
0.1.1

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/flowpeek/MAL-2026-1437.json"