-= Per source details. Do not edit below this line.=-
Designed to run on Android. Under the mask of an AI agent, the code downloads a remote executable on import, and during usage, silently exfiltrates data like text messages and contacts.
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2026-05-metoopro
Reasons (based on the campaign):
infostealer
files-exfiltration
exfiltration-generic
Downloads and executes a remote executable.
{
"iocs": {
"urls": [
"https://raw.githubusercontent.com/Sufiyan65889/Rish-Shizuku/main/rish_shizuku.dex",
"https://raw.githubusercontent.com/Sufiyan65889/Rish-Shizuku/main/rish"
]
},
"malicious-packages-origins": [
{
"id": "pypi/2026-05-metoopro/metoopro",
"sha256": "6e089d4b8b0fe90a96024c1160f198df5ab7ec0b30f1f5765cf81ef4aa640279",
"import_time": "2026-05-03T14:23:32.589652627Z",
"source": "kam193",
"modified_time": "2026-05-03T13:42:23.986895Z",
"versions": [
"1.0.2"
]
},
{
"id": "pypi/2026-05-metoopro/metoopro",
"sha256": "ec715c6e6890e5e733fab87a17477c312e7c00bfb525b368e614a1da1c96214c",
"import_time": "2026-05-07T20:02:41.174048346Z",
"source": "kam193",
"modified_time": "2026-05-03T13:42:23.986895Z",
"versions": [
"1.0.2"
]
}
]
}