-= Per source details. Do not edit below this line.=-
During import, package masquerade and starts an embedded executable. The executable has signs of infostealer activity
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2026-02-requests-toolkit
Reasons (based on the campaign):
impersonation
infostealer
malware
The package contains code to detect if it is running in a sandbox environment.
keylogger
{
"malicious-packages-origins": [
{
"id": "pypi/2026-02-requests-toolkit/http-request-toolkit",
"import_time": "2026-02-16T07:28:49.580166101Z",
"source": "kam193",
"modified_time": "2026-02-16T07:03:21.22114Z",
"sha256": "13b29a753802db633ab987963543535999a246049761d4d29699b66edf207f13",
"versions": [
"2.28.3",
"2.28.4",
"2.28.5"
]
},
{
"id": "RLMA-2026-00396",
"import_time": "2026-03-19T12:18:17.967835409Z",
"source": "reversing-labs",
"modified_time": "2026-03-18T12:14:43Z",
"sha256": "8611f488d8714ccabd0499250be69556cbaffbf4b7e0bc18b179bde7fff3d722",
"versions": [
"2.28.3",
"2.28.4",
"2.28.5"
]
}
]
}