Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Malicious Packagist Packages Disguised as Laravel Utilities Deploy Encrypted RAT

0
Medium
Published: Wed Mar 04 2026 (03/04/2026, 10:55:55 UTC)
Source: AlienVault OTX General

Description

A remote access trojan (RAT) has been discovered in multiple Packagist packages published by the threat actor nhattuanbl. The malicious packages, disguised as Laravel utilities, install an encrypted PHP RAT via Composer dependencies. The payload connects to a C2 server, sends system reconnaissance data, and awaits commands, granting full remote access to the host. The RAT uses obfuscation techniques to resist analysis and employs a self-launch mechanism. It communicates with the C2 server using encrypted JSON messages and supports various commands for system control and data exfiltration. The attack vector leverages dependency chains, with clean-looking packages pulling in malicious ones. Affected systems should be treated as compromised, with recommendations provided for mitigation and prevention.

AI-Powered Analysis

AILast updated: 03/04/2026, 11:17:39 UTC

Technical Analysis

The threat involves multiple malicious PHP packages uploaded to Packagist, the primary PHP package repository, disguised as legitimate Laravel utility packages. These packages, attributed to the threat actor nhattuanbl, exploit the Composer dependency management system by embedding an encrypted Remote Access Trojan (RAT) within the package dependencies. When developers include these seemingly benign packages in their projects, the malicious payload is installed silently. The RAT is designed with obfuscation techniques to hinder static and dynamic analysis and includes a self-launch mechanism to maintain persistence on the infected system. Once active, the RAT connects to a command and control (C2) server at helper.leuleu.net on port 2096, communicating via encrypted JSON messages. It performs system reconnaissance, sending detailed information about the host to the attacker, and awaits further commands that allow the adversary to execute arbitrary code, exfiltrate data, and control the system remotely. The attack leverages dependency chains, meaning clean-looking packages may pull in these malicious dependencies indirectly, increasing the infection surface. Indicators of compromise include a specific file hash (a493ce9509c5180e997a04cab2006a48202afbb8edfa15149a4521067191ead7) and network connections to the malicious domain and URL. No known exploits in the wild have been reported yet, but the threat is active and poses a significant risk to PHP development environments that rely on Packagist and Composer for package management.

Potential Impact

This threat can have severe consequences for organizations relying on PHP and Laravel frameworks, particularly those using Composer and Packagist for dependency management. The RAT grants attackers full remote access to compromised hosts, enabling unauthorized data access, system manipulation, and lateral movement within networks. This can lead to data breaches, intellectual property theft, disruption of services, and potential deployment of additional malware. The stealthy nature of the attack, leveraging trusted package dependencies and obfuscation, complicates detection and response efforts. Organizations may face reputational damage, regulatory penalties, and financial losses due to compromised systems. The dependency-chain attack vector increases the risk of widespread infection across development environments and production systems that incorporate these packages, potentially affecting continuous integration and deployment pipelines.

Mitigation Recommendations

1. Conduct rigorous auditing of all Composer dependencies, including transitive dependencies, to identify and remove any suspicious or unverified packages. 2. Employ automated tools that scan for known malicious package hashes and monitor for unusual package behavior or network connections. 3. Implement strict policies to restrict the use of third-party packages to those from trusted sources and maintain an allowlist of approved packages. 4. Monitor outbound network traffic for connections to suspicious domains or IP addresses, particularly those matching known C2 infrastructure such as helper.leuleu.net. 5. Use runtime application self-protection (RASP) and endpoint detection and response (EDR) solutions to detect anomalous process behavior and persistence mechanisms. 6. Educate development teams about the risks of supply chain attacks and encourage the use of package integrity verification methods like Composer's hash verification and signature checks. 7. Regularly update and patch development tools and environments to reduce exposure to exploitation. 8. In case of compromise, treat affected systems as fully compromised: isolate, perform forensic analysis, remove malicious packages, and rebuild environments from known good sources. 9. Engage in threat intelligence sharing to stay informed about emerging malicious packages and indicators of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://socket.dev/blog/malicious-packagist-packages-disguised-as-laravel-utilities"]
Adversary
nhattuanbl
Pulse Id
69a80fbbdd6d5ec66e2a4a06
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hasha493ce9509c5180e997a04cab2006a48202afbb8edfa15149a4521067191ead7

Url

ValueDescriptionCopy
urlhttp://helper.leuleu.net:2096

Domain

ValueDescriptionCopy
domainhelper.leuleu.net

Threat ID: 69a81150d1a09e29cb2bba0b

Added to database: 3/4/2026, 11:02:40 AM

Last enriched: 3/4/2026, 11:17:39 AM

Last updated: 3/5/2026, 6:23:58 AM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses