Technical Analysis & Remediation
MITRE ATT&CK Mapping
T1059.003
Command and Scripting Interpreter: Windows Command Shell (Batch scripts).
T1027.003
Obfuscated Files or Information: Steganography (Payloads hidden in RGB pixel values).
T1548.002
Abuse Elevation Control Mechanism: Bypass User Account Control (fodhelper.exe).
T1055.012
Process Injection: Process Hollowing (Targeting legitimate Windows processes).
T1547.001
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder.
CVE Profile
NVD Score
Unknown (No specific CVE assigned for this malicious package)
CISA KEV Status
Inactive
Telemetry
Delivery Package
buildrunner-dev
Dropped Files
packageloader.bat
init.js
JJYDJO.exe
%AppData%\protect.bat
Steganographic Files
6b8owksyv28w.png (41x41 px, 2.3 KB), 0zt4quciwxs2.png (141x141 px, 67 KB)
C2 / Payload URL hxxps://i[.]ibb[.]co/tpyTL2Zg/s9rugowxbq8i[.]png
Constraint
The final structure resembles the open-source Pulsar RAT, loaded directly into a Windows process via process hollowing to evade detection.
Remediation - THE ENTERPRISE TRACK (NIST SP 800-61r3 / CSF 2.0)
GOVERN (GV) – Crisis Management & Oversight
Command
Enforce software supply chain risk management policies mandating the auditing of new or untrusted NPM dependencies before introduction to the CI/CD pipeline.
DETECT (DE) – Monitoring & Analysis
Command
Deploy SIEM queries hunting for fodhelper.exe spawning abnormal child processes (e.g., conhost.exe, powershell.exe) without interactive user sessions.
Command
Monitor EDR telemetry for anomalous outbound network connections to free image hosting services (e.g., ImgBB) originating from script interpreters or developer IDEs.
RESPOND (RS) – Mitigation & Containment
Command
Isolate endpoints exhibiting process hollowing behavior or executing packageloader.bat from the corporate network immediately.
Command
Preserve volatile memory (RAM) on infected endpoints to extract the unencrypted .NET assembly and identify active C2 connections.
RECOVER (RC) – Restoration & Trust
Command
Reimage all compromised developer workstations from a known-good baseline.
Command
Force rotation of all credentials, API keys, and access tokens stored on affected devices.
IDENTIFY & PROTECT (ID/PR) – The Feedback Loop
Command
Configure NPM to disable automatic execution of install scripts globally by executing npm config set ignore-scripts true.
Remediation - THE HOME USER TRACK (Safety Focus)
Priority 1: Safety
Threat Level
Theoretical/Low. The delivery dependency (NPM/Node.js) is not installed by default on Windows Home environments.
Command
Disconnect from the internet immediately only if you are a developer who recently installed the buildrunner-dev package or are experiencing anomalous command prompt popups.
Command
Do not log into banking/email until verified clean.
Priority 2: Identity
Command
Reset passwords and MFA tokens using a known clean device (e.g., a mobile phone on a 5G cellular network).
Priority 3: Persistence
Command
Check the Windows Startup folder (shell:startup) and %AppData% for unexpected batch files, specifically looking for protect.bat or packageloader.bat.
Hardening & References
Baseline
CIS Benchmarks for Windows 10/11 (Enforcing UAC to maximum strictly), CIS Benchmarks for Node.js (Supply Chain Security).
Framework
NIST CSF 2.0 / SP 800-61r3.
Source
Veracode Blog
Cyber Security News