Malicious Packagist Packages Disguised as Laravel Utilities Deploy Encrypted RAT
A remote access trojan (RAT) has been discovered in multiple Packagist packages published by the threat actor nhattuanbl. The malicious packages, disguised as Laravel utilities, install an encrypted PHP RAT via Composer dependencies. The payload connects to a C2 server, sends system reconnaissance data, and awaits commands, granting full remote access to the host. The RAT uses obfuscation techniques to resist analysis and employs a self-launch mechanism. It communicates with the C2 server using encrypted JSON messages and supports various commands for system control and data exfiltration. The attack vector leverages dependency chains, with clean-looking packages pulling in malicious ones. Affected systems should be treated as compromised, with recommendations provided for mitigation and prevention.
AI Analysis
Technical Summary
The threat involves multiple malicious PHP packages uploaded to Packagist, the primary PHP package repository, disguised as legitimate Laravel utility packages. These packages, attributed to the threat actor nhattuanbl, exploit the Composer dependency management system by embedding an encrypted Remote Access Trojan (RAT) within the package dependencies. When developers include these seemingly benign packages in their projects, the malicious payload is installed silently. The RAT is designed with obfuscation techniques to hinder static and dynamic analysis and includes a self-launch mechanism to maintain persistence on the infected system. Once active, the RAT connects to a command and control (C2) server at helper.leuleu.net on port 2096, communicating via encrypted JSON messages. It performs system reconnaissance, sending detailed information about the host to the attacker, and awaits further commands that allow the adversary to execute arbitrary code, exfiltrate data, and control the system remotely. The attack leverages dependency chains, meaning clean-looking packages may pull in these malicious dependencies indirectly, increasing the infection surface. Indicators of compromise include a specific file hash (a493ce9509c5180e997a04cab2006a48202afbb8edfa15149a4521067191ead7) and network connections to the malicious domain and URL. No known exploits in the wild have been reported yet, but the threat is active and poses a significant risk to PHP development environments that rely on Packagist and Composer for package management.
Potential Impact
This threat can have severe consequences for organizations relying on PHP and Laravel frameworks, particularly those using Composer and Packagist for dependency management. The RAT grants attackers full remote access to compromised hosts, enabling unauthorized data access, system manipulation, and lateral movement within networks. This can lead to data breaches, intellectual property theft, disruption of services, and potential deployment of additional malware. The stealthy nature of the attack, leveraging trusted package dependencies and obfuscation, complicates detection and response efforts. Organizations may face reputational damage, regulatory penalties, and financial losses due to compromised systems. The dependency-chain attack vector increases the risk of widespread infection across development environments and production systems that incorporate these packages, potentially affecting continuous integration and deployment pipelines.
Mitigation Recommendations
1. Conduct rigorous auditing of all Composer dependencies, including transitive dependencies, to identify and remove any suspicious or unverified packages. 2. Employ automated tools that scan for known malicious package hashes and monitor for unusual package behavior or network connections. 3. Implement strict policies to restrict the use of third-party packages to those from trusted sources and maintain an allowlist of approved packages. 4. Monitor outbound network traffic for connections to suspicious domains or IP addresses, particularly those matching known C2 infrastructure such as helper.leuleu.net. 5. Use runtime application self-protection (RASP) and endpoint detection and response (EDR) solutions to detect anomalous process behavior and persistence mechanisms. 6. Educate development teams about the risks of supply chain attacks and encourage the use of package integrity verification methods like Composer's hash verification and signature checks. 7. Regularly update and patch development tools and environments to reduce exposure to exploitation. 8. In case of compromise, treat affected systems as fully compromised: isolate, perform forensic analysis, remove malicious packages, and rebuild environments from known good sources. 9. Engage in threat intelligence sharing to stay informed about emerging malicious packages and indicators of compromise.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Netherlands, Japan, India, Brazil
Indicators of Compromise
- hash: a493ce9509c5180e997a04cab2006a48202afbb8edfa15149a4521067191ead7
- url: http://helper.leuleu.net:2096
- domain: helper.leuleu.net
Malicious Packagist Packages Disguised as Laravel Utilities Deploy Encrypted RAT
Description
A remote access trojan (RAT) has been discovered in multiple Packagist packages published by the threat actor nhattuanbl. The malicious packages, disguised as Laravel utilities, install an encrypted PHP RAT via Composer dependencies. The payload connects to a C2 server, sends system reconnaissance data, and awaits commands, granting full remote access to the host. The RAT uses obfuscation techniques to resist analysis and employs a self-launch mechanism. It communicates with the C2 server using encrypted JSON messages and supports various commands for system control and data exfiltration. The attack vector leverages dependency chains, with clean-looking packages pulling in malicious ones. Affected systems should be treated as compromised, with recommendations provided for mitigation and prevention.
AI-Powered Analysis
Technical Analysis
The threat involves multiple malicious PHP packages uploaded to Packagist, the primary PHP package repository, disguised as legitimate Laravel utility packages. These packages, attributed to the threat actor nhattuanbl, exploit the Composer dependency management system by embedding an encrypted Remote Access Trojan (RAT) within the package dependencies. When developers include these seemingly benign packages in their projects, the malicious payload is installed silently. The RAT is designed with obfuscation techniques to hinder static and dynamic analysis and includes a self-launch mechanism to maintain persistence on the infected system. Once active, the RAT connects to a command and control (C2) server at helper.leuleu.net on port 2096, communicating via encrypted JSON messages. It performs system reconnaissance, sending detailed information about the host to the attacker, and awaits further commands that allow the adversary to execute arbitrary code, exfiltrate data, and control the system remotely. The attack leverages dependency chains, meaning clean-looking packages may pull in these malicious dependencies indirectly, increasing the infection surface. Indicators of compromise include a specific file hash (a493ce9509c5180e997a04cab2006a48202afbb8edfa15149a4521067191ead7) and network connections to the malicious domain and URL. No known exploits in the wild have been reported yet, but the threat is active and poses a significant risk to PHP development environments that rely on Packagist and Composer for package management.
Potential Impact
This threat can have severe consequences for organizations relying on PHP and Laravel frameworks, particularly those using Composer and Packagist for dependency management. The RAT grants attackers full remote access to compromised hosts, enabling unauthorized data access, system manipulation, and lateral movement within networks. This can lead to data breaches, intellectual property theft, disruption of services, and potential deployment of additional malware. The stealthy nature of the attack, leveraging trusted package dependencies and obfuscation, complicates detection and response efforts. Organizations may face reputational damage, regulatory penalties, and financial losses due to compromised systems. The dependency-chain attack vector increases the risk of widespread infection across development environments and production systems that incorporate these packages, potentially affecting continuous integration and deployment pipelines.
Mitigation Recommendations
1. Conduct rigorous auditing of all Composer dependencies, including transitive dependencies, to identify and remove any suspicious or unverified packages. 2. Employ automated tools that scan for known malicious package hashes and monitor for unusual package behavior or network connections. 3. Implement strict policies to restrict the use of third-party packages to those from trusted sources and maintain an allowlist of approved packages. 4. Monitor outbound network traffic for connections to suspicious domains or IP addresses, particularly those matching known C2 infrastructure such as helper.leuleu.net. 5. Use runtime application self-protection (RASP) and endpoint detection and response (EDR) solutions to detect anomalous process behavior and persistence mechanisms. 6. Educate development teams about the risks of supply chain attacks and encourage the use of package integrity verification methods like Composer's hash verification and signature checks. 7. Regularly update and patch development tools and environments to reduce exposure to exploitation. 8. In case of compromise, treat affected systems as fully compromised: isolate, perform forensic analysis, remove malicious packages, and rebuild environments from known good sources. 9. Engage in threat intelligence sharing to stay informed about emerging malicious packages and indicators of compromise.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://socket.dev/blog/malicious-packagist-packages-disguised-as-laravel-utilities"]
- Adversary
- nhattuanbl
- Pulse Id
- 69a80fbbdd6d5ec66e2a4a06
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hasha493ce9509c5180e997a04cab2006a48202afbb8edfa15149a4521067191ead7 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://helper.leuleu.net:2096 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainhelper.leuleu.net | — |
Threat ID: 69a81150d1a09e29cb2bba0b
Added to database: 3/4/2026, 11:02:40 AM
Last enriched: 3/4/2026, 11:17:39 AM
Last updated: 3/5/2026, 6:23:58 AM
Views: 32
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Signed malware impersonating workplace apps deploys RMM backdoors
MediumSilver Dragon Targets Organizations in Southeast Asia and Europe
MediumFunnull Resurfaces: Exposing RingH23 Arsenal and MacCMS Supply Chain Attacks
MediumSloppyLemming Deploys BurrowShell and Rust-Based RAT to Target Pakistan and Bangladesh
MediumOAuth redirection abuse enables phishing and malware delivery
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.