Back to reports
mediumPhishing

Pulsar RAT v2.4.5 — MSI Dropper with GUID-Encoded Shellcode & Cloudflare Workers C2

InvestigatedMarch 14, 2026PublishedMarch 14, 2026
phishingsocial-engineeringcredential-theftc2exploitapt

Breakglass Intelligence — GHOST Operator Report Date: 2026-03-13 Classification: Active Campaign — Pulsar RAT MaaS Confidence: HIGH


Executive Summary

haunt.msi is a Windows Installer package that delivers Pulsar RAT v2.4.5.0, a sophisticated open-source .NET Remote Access Trojan. Despite being tagged as "njRAT" upon initial submission, static analysis definitively identifies the payload as Pulsar RAT — a feature-rich MaaS implant with cryptocurrency clipboard hijacking, credential theft, keylogging, webcam/audio capture, and browser profile cloning.

The loader employs three distinct evasion innovations:

  1. GUID-encoded shellcode — 973 KB of x64 shellcode stored as 60,820 Windows GUIDs in the PE .rdata section, evading signature-based detection
  2. In-memory CLR hosting — bypasses AMSI, ETW, and WLDP before reflectively loading the .NET payload
  3. Cloudflare Workers C2 relayhost.fedmenigga.workers.dev proxies all C2 traffic through Cloudflare's CDN to a Frankfurt Windows Server VPS, preventing domain blocklisting

The campaign is actively running as of 2026-03-13, with new Pulsar RAT clients (yuorw.exe) deployed same-day as this sample. The backend infrastructure serves multiple toolsets including a Python DDoS agent and cross-platform payloads, indicating a capable actor running a sustained multi-capability campaign since at least February 2026.


Sample Metadata

FieldValue
Filenamehaunt.msi
SHA256e4bd27de913a316b2033eb45baf21ba09ff05000a910542f7ffc50117b4aee26
MD57d19b113f3faf859bec3e2c89fc80e03
SHA1640c92982d1d3de852daba1e51036d1950f11ee4
File TypeWindows Installer (MSI) — Composite Document File V2
File Size3,309,962 bytes (3.16 MB)
First Seen2026-03-12 17:17:56 UTC
VT Detections5 / 76 (ESET, Kaspersky, Sangfor, Skyhigh, Tencent)
Reportersmica83
VT Tagsmalware, checks-usb-bus, msi
Submitted Namehaunt.msi / 6dcf82.msi
Build ToolWiX Toolset 6.0.2.0
Compile Time2026-03-11 21:49:42 UTC (MSI) / 2026-02-02 03:57:13 UTC (DLL)

Static Analysis

MSI Structure

The installer is built with WiX Toolset 6.0.2.0. Key metadata from the MSI database:

FieldValue
Product NameJJRIPKSKP (random gibberish)
ManufacturerSEMPK
ProductCode{43B1A54F-CBF4-440F-9EC9-1F6F3E5A9DC6}
UpgradeCode{DB2F2180-BFEB-4C7D-87A7-003AFDEFE794}
RevisionNumber{F33C6B39-ED26-432B-8E9A-20F3917C9583}
Registry KeySoftware\SEMPK\JJRIPKSKP

The MSI contains a single embedded binary (Binary.LoaderDll, 3,146,825 bytes) invoked via a CustomAction called RunDll:

Action:  RunDll
Source:  nGOYQVFxRyF       (exported function name)
Target:  rundll32.exe "cfgmgr.dll", nGOYQVFxRyF

A silent rollback action (FSilent) is configured, suppressing any UI during installation.

Binary.LoaderDll — The Loader (cfgmgr.dll masquerade)

FieldValue
TypePE32+ (64-bit DLL)
Sections11 sections
Image Base0x25b100000
Timestamp2026-02-02 03:57:13 UTC
Exports Namecfgmgr.dll (Windows Configuration Manager — DLL hijack masquerade)
Anti-debugIsDebuggerPresent, CheckRemoteDebuggerPresent
PersistenceSoftware\Microsoft\Windows\CurrentVersion\Run
Injection targetnotepad.exe

Exported functions (masquerading as legitimate cfgmgr.dll):

DllInstall          FlushInstallLog     GetConfigurationValue
GetDiagnosticsInfo  GetProductVersion   MsiHelperCleanup
nGOYQVFxRyF         RqaAvOHynShq        ServiceMain
SetConfigurationValue

The actual DLL entrypoint is nGOYQVFxRyF (obfuscated name).

NT API imports for process injection (loaded directly from ntdll.dll):

ZwAllocateVirtualMemory     ZwWriteVirtualMemory      ZwProtectVirtualMemory
ZwQueueApcThread            ZwResumeThread            ZwSetContextThread
ZwGetContextThread          ZwCreateSection           ZwMapViewOfSection
ZwUnmapViewOfSection        ZwSetInformationThread    RtlAddFunctionTable

Section layout:

SectionRaw SizeVirtual SizeEntropyNote
.text0x3cc0Loader code
.data0x79b90Runtime data
.rdata0x252458GUID-encoded shellcode (2.43 MB)

GUID-Encoded Shellcode — Novel Obfuscation Technique

The .rdata section contains 60,820 Windows GUID-formatted entries that together encode 973,120 bytes of x64 shellcode. Each GUID's bytes are stored in Windows in-memory GUID format, requiring byte-swapping of the first three components during decoding:

Raw GUID:   000098e9-5300-5756-5541-504151415241
Windows LE: e9 98 00 00 00 | 53 00 | 56 57 | 55 41 50 41 51 41 52 41
Decoded:    e9 98 00 00 00  53 00  56 57  55 41 50 41 51 41 52 41
Assembly:   JMP +0x98       ...    PUSH RSI PUSH RBP PUSH R8 PUSH R9 PUSH R10 PUSH R11 ...

The first instruction (E9 98 00 00 00 = JMP +0x9d) jumps to the actual shellcode at offset 0x9d.

This technique is not seen in common malware families and appears purpose-built to evade signature-based detection systems that scan for shellcode byte sequences.

Shellcode Internals — CLR Host with Triple Bypass

The 973 KB shellcode acts as a native CLR host performing three bypass operations before loading the .NET payload:

1. AMSI Bypass:

AmsiInitialize    AmsiScanBuffer    AmsiScanString

The shellcode patches AMSI functions in memory to disable antivirus scanning of script content.

2. ETW Bypass:

EtwEventWrite    EtwEventUnregister

Event Tracing for Windows (used by EDRs) is disabled by overwriting the function prologue.

3. WLDP Bypass (Windows Lockdown Policy):

WldpQueryDynamicCodeTrust    WldpIsClassInApprovedList

Windows Lockdown Policy functions are bypassed to allow dynamic code execution.

CLR Loading sequence:

ole32;oleaut32;wininet;mscoree;shell32   (DLLs loaded for CLR host)
v4.0.30319                               (.NET 4.0 runtime)

The shellcode then reflectively loads an embedded .NET PE (the Pulsar RAT payload) from position 0x99b41 in the decoded shellcode, using a custom in-memory PE loader.

Embedded Payload — Pulsar RAT v2.4.5.0 (.NET)

Identification:

costura.pulsar.common.dll.compressed|2.4.5.0|Pulsar.Common, Version=2.4.5.0,
  Culture=neutral, PublicKeyToken=null|Pulsar.Common.dll|71AD34CD9F4F3EE2328CA1C7A64A576499208F43|187392

The payload is definitively identified as Pulsar RAT v2.4.5.0 via its embedded Pulsar.Common.dll (SHA1: 71AD34CD9F4F3EE2328CA1C7A64A576499208F43).

Embedded dependencies (Costura.Fody):

  • messagepack.dll — MessagePack serialization for C2 protocol
  • messagepack.annotations.dll
  • pulsar.common.dll — Pulsar RAT shared library
  • system.buffers.dll, system.collections.immutable.dll, system.memory.dll
  • system.threading.tasks.extensions.dll
  • system.runtime.compilerservices.unsafe.dll

Capabilities extracted from .NET user string heap:

CategoryEvidence
KeyloggingGma.System.MouseKeyHook, KeyloggerService
Screen captureSharpDX, SharpDX.Direct3D11, SharpDX.DXGI, SharpDX.D3DCompiler
WebcamAForge.Video, AForge.Video.DirectShow, FilterInfoCollection
AudioNAudio.Core, NAudio.Wasapi, Error stopping audio
Crypto hijackRegex patterns for BTC/ETH/LTC/XMR/SOL/XRP/TRX/BCH (see below)
Browser theftPK11SDR_Decrypt (Firefox), logins (Firefox logins.json), Cloning browser profile
Browser targetsChrome, Edge, Brave (Local\BraveSoftware\Brave), Opera (Roaming\Opera Software\Opera Stable)
Remote execution<ExecuteViaRunPE>b__0 (process hollowing)
Handle hijackingRemote file handle hijacked successfully, OpenProcess
IP geolocationhttps://ipwho.is/
Anti-VMCheckForVMwareAndVirtualBox, VMware/VirtualBox/QEMU/Parallels strings
Anti-debugx32dbg, x64dbg, windbg, ollydbg, dnspy, immunity debugger, ida
Remote chatFrmRemoteChat, Sendpacket, Chat has been ended
RegistryHKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Themes\Personalize
PersistenceSoftware\Microsoft\Windows\CurrentVersion\Run, notepad.exe

Cryptocurrency wallet clipboard hijacker — Targeted currencies:

CurrencyDetection Regex
Bitcoin (BTC)^(1|3|bc1)[a-zA-Z0-9]{25,39}$
Ethereum (ETH)^0x[a-fA-F0-9]{40}$
Monero (XMR)^4[0-9AB][1-9A-HJ-NP-Za-km-z]{93}$
Solana (SOL)^[1-9A-HJ-NP-Za-km-z]{32,44}$
Litecoin (LTC)^(L|M|3)-9]{26,33}$
XRP^X[1-9A-HJ-NP-Za-km-z]{33}$
Ripple^r[0-9a-zA-Z]{24,34}$
TRON (TRX)^T[1-9A-HJ-NP-Za-km-z]{33}$
Bitcoin Cash (BCH)^(bitcoincash:)?(q|p)[a-z0-9]{41}$

When a victim copies a crypto wallet address to their clipboard, Pulsar RAT replaces it with the attacker's address before the victim can paste it.

Firefox Password Theft — PKCS#11 decryption:

PK11SDR_Decrypt      logins       httpRealm
formSubmitURL        usernameField    EncryptedUsername

Infection Chain / Kill Chain

[1] DELIVERY
    haunt.msi delivered to victim (method unknown — likely social engineering)
    └── File: haunt.msi (3.16 MB, WiX Toolset 6.0.2.0)

[2] EXECUTION
    User runs MSI → Windows Installer executes CustomAction
    └── rundll32.exe "<temp>\cfgmgr.dll",nGOYQVFxRyF
        (MSI drops Binary.LoaderDll → cfgmgr.dll in %TEMP%)

[3] LOADER STAGE (cfgmgr.dll / Binary.LoaderDll)
    ├── Reads 60,820 GUID entries from .rdata section
    ├── Decodes GUID format → raw x64 shellcode (973 KB)
    ├── Allocates RWX memory, copies shellcode
    └── Transfers execution to shellcode

[4] SHELLCODE STAGE (973 KB x64)
    ├── AMSI bypass (patches AmsiScanBuffer)
    ├── ETW bypass (patches EtwEventWrite)
    ├── WLDP bypass (patches WldpQueryDynamicCodeTrust)
    ├── Loads CLR runtime (mscoree.dll → v4.0.30319)
    ├── Reflectively loads embedded Pulsar RAT .NET PE
    └── Hands execution to .NET runtime

[5] PAYLOAD STAGE (Pulsar RAT v2.4.5.0)
    ├── Anti-VM checks (VMware/VirtualBox/QEMU/Parallels/Cuckoo)
    ├── Anti-debug checks (x64dbg/WinDbg/dnspy/etc.)
    ├── Persistence: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
    ├── IP geolocation: GET https://ipwho.is/
    ├── C2 connection: HTTPS → host.fedmenigga.workers.dev:443
    │   └── Cloudflare Worker relay → 31.57.147.207:? (backend)
    └── Waits for operator commands:
        ├── Keylog
        ├── Screenshot / screen stream (SharpDX)
        ├── Webcam capture (AForge)
        ├── Audio capture (NAudio)
        ├── Clipboard monitor → crypto address replacement
        ├── Browser credential dump (Chromium + Firefox)
        ├── Remote shell
        ├── File manager
        ├── Process manager / injection
        └── Remote chat

[6] PERSISTENCE
    Registry Run key: notepad.exe (or injected process)
    CLSID registration: {6C683247-F56D-470B-AAFA-9E232B4F4FF0}
    Hidden file: %APPDATA%\Microsoft\Crypto\RSA\qyjbnsml\sml.dll

Network Indicators

C2 Architecture

Victim Machine
     │
     │ HTTPS/443
     ▼
[Cloudflare CDN — C2 Relay]
 104.20.44.133   (Cloudflare)
 104.21.73.44    (Cloudflare)
 172.66.175.107  (Cloudflare)
 172.67.140.32   (Cloudflare)
     │
     │ host.fedmenigga.workers.dev
     ▼
[Cloudflare Worker — fedmenigga]
 → Routes traffic to backend
     │
     ▼
[Backend C2 Server]
 31.57.147.207:??? (Windows Server 2022)
 HostName: WIN-9QL4SDRB93L
 SSL Cert: kixlil.bloxfruitt.art
 ISP: Sprious LLC / GOLD IP L.L.C-FZ
 ASN: 64267
 Location: Frankfurt am Main, Germany

[Alternative Relay — Second campaign]
 dainty-boba-01d5e4.netlify.app
 → 98.84.224.111 (AWS us-east-1)
 → 18.208.88.157 (AWS us-east-1)

C2 Domain Infrastructure

DomainRoleInfrastructureNotes
host.fedmenigga.workers.devPRIMARY C2 RELAYCloudflare WorkersContacted by haunt.msi + yuorw.exe + builder.bat
fedmenigga.workers.devC2 relay baseCloudflare WorkersRegistered under Cloudflare
kixlil.bloxfruitt.artBackend FQDN31.57.147.207SSL cert on backend server
bloxfruitt.artBackend domainNamecheap registrarRegistered Dec 2024
dainty-boba-01d5e4.netlify.appAlt C2 relayNetlify / AWSUsed by Client.exe campaign
ipwho.isIP geolocationLegitimate APIUsed by Pulsar to geolocate victim

Backend Server — 31.57.147.207

FieldValue
IP31.57.147.207
ASNAS64267
AS Owner12651980 CANADA INC.
ISPSprious LLC / GOLD IP L.L.C-FZ
LocationFrankfurt am Main, Hessen, Germany
OSWindows Server 2022 (Build 10.0.20348)
HostnameWIN-9QL4SDRB93L
SSL Cert CNkixlil.bloxfruitt.art
Open Ports135 (RPC), 139 (NetBIOS), 445 (SMB v2), 3389 (RDP), 5985 (WinRM)
VulnerabilityCVE-2020-0796 (SMBGhost — SMBv3 compression RCE)
Shodan Updated2026-03-12 16:29:04 UTC

Notable: This is a Windows VPS (not Linux) which hosts the Pulsar RAT C2 panel (also a Windows application). RDP port 3389 is open, suggesting the operator manages it via RDP. The SMBGhost vulnerability is present but may not be exploitable if patched at OS level.

bloxfruitt.art Subdomain Infrastructure (Full Discovery)

All subdomains had Let's Encrypt certificates issued in December 2024, suggesting simultaneous provisioning of a C2 panel and multiple client endpoints:

SubdomainCert IssuedNotes
kixlil.bloxfruitt.art2024-12-02Linked to 31.57.147.207
plxoq.bloxfruitt.art2024-12-02
qfip.bloxfruitt.art2024-12-02
xcbtg.bloxfruitt.art2024-12-02
poplo.bloxfruitt.art2024-12-02
hucis.bloxfruitt.art2024-12-06
plco.bloxfruitt.art2024-12-06
zkxcop.bloxfruitt.art2024-12-06
qwrtyui.bloxfruitt.art2024-12-01
vgjryu.bloxfruitt.art2024-12-01
nsxcjhu.bloxfruitt.art2024-12-01
kixnjs.bloxfruitt.art2024-12-01
pozopl.bloxfruitt.art2024-12-01
*.bloxfruitt.art2025-12-01Wildcard cert renewed 2025

All subdomains currently have no DNS resolution — infrastructure was likely relocated or subdomains point to a different backend than the zone apex record.


Behavioral Analysis (Inferred from Static + OSINT)

  1. Installation: MSI silently installs (LIMITUI=7, ARPSYSTEMCOMPONENT=1 — no Add/Remove Programs entry)
  2. Persistence: Written to HKCU\Software\Microsoft\Windows\CurrentVersion\Run as notepad.exe masquerade
  3. Anti-analysis: Checks for 20+ VM artifacts (VMware, VirtualBox, QEMU, Cuckoo, Parallels) and 8+ debuggers before activating
  4. Geolocate: Calls https://ipwho.is/ to get victim IP, country, ISP
  5. C2 beacon: Connects to host.fedmenigga.workers.dev via HTTPS (port 443), using MessagePack-serialized protocol over TLS
  6. Clipboard hijack: Monitors clipboard continuously; replaces any recognized crypto address with attacker's address
  7. Credential theft: Dumps browser saved passwords from Chromium profile (Login Data) and Firefox (logins.json via PKCS#11)
  8. Data exfiltration: All captured data (keystrokes, screenshots, credentials, clipboard) sent to C2 operator in real-time

MITRE ATT&CK TTPs

Technique IDNameImplementation
T1566PhishingMSI delivered as social engineering lure
T1204.002User Execution: Malicious FileUser runs haunt.msi
T1218.007MsiexecMSI installer as execution vehicle
T1218.011Rundll32rundll32.exe cfgmgr.dll,nGOYQVFxRyF
T1036.005Masquerading: Match Legitimate Namecfgmgr.dll DLL name
T1027Obfuscated Files or InformationGUID-encoded shellcode
T1027.011Fileless StorageShellcode decoded into memory
T1140Deobfuscate/Decode FilesGUID-to-bytes decoding at runtime
T1620Reflective Code LoadingPulsar RAT loaded from memory
T1562.001Disable or Modify Tools (AMSI)Patches AmsiScanBuffer
T1562.006Indicator Blocking (ETW)Patches EtwEventWrite
T1055.004Process Injection: APCZwQueueApcThread
T1055.012Process Hollowing<ExecuteViaRunPE> into notepad.exe
T1547.001Registry Run Keys / Startup FolderHKCU...\Run persistence
T1071.001Web ProtocolsHTTPS C2 on port 443
T1090.004Domain FrontingCloudflare Workers relay
T1090.001Internal ProxyCloudflare → backend routing
T1041Exfiltration Over C2 ChannelAll data via HTTPS to C2
T1056.001KeyloggingGma.System.MouseKeyHook
T1115Clipboard DataCrypto wallet monitoring
T1185Browser Session HijackingBrowser profile cloning
T1555.003Web Browser CredentialsChrome/Edge/Brave/Opera/Firefox
T1539Steal Web Session CookieBrowser profile exfiltration
T1125Video CaptureAForge webcam capture
T1123Audio CaptureNAudio microphone recording
T1113Screen CaptureSharpDX screen streaming
T1057Process DiscoveryWMI Win32_BIOS, Win32_DiskDrive
T1082System Information DiscoveryOS version, hardware, CLR version
T1012Query RegistrySOFTWARE\Microsoft\Windows NT\CurrentVersion
T1497Virtualization/Sandbox EvasionVM artifact checking
T1480Execution GuardrailsDebugger detection + sleep delays
T1622Debugger EvasionAnti-debug thread monitoring

Timeline

DateEventIndicator
2024-12-01bloxfruitt.art infrastructure createdLet's Encrypt certs issued for 13+ subdomains
2026-02-04Bot deployment beginsbot.exe (Python DDoS/KryptonC2) first seen
2026-02-16First Pulsar RAT campaignpayload/Client.exe via Netlify relay
2026-02-22Builder deployedbuilder.bat (1.35 MB) first seen
2026-03-06Multi-platform payloadagent-windows-amd64.exe deployed
2026-03-12haunt.msi campaign launchFirst submission of this sample
2026-03-13Active deploymentyuorw.exe (new Pulsar client) same-day as haunt.msi
SHA256NameTypeDetectionsRole
e4bd27de...haunt.msiMSI dropper5/76This sample — Pulsar RAT loader
3aece208...yuorw.exe / Client.exePE32 .NET EXE47/76Raw Pulsar RAT v2.4.5 client
25a8f876...payload / Client.exePE32 .NET EXE46/76Pulsar RAT v2.4.5 (earlier campaign)
5e77eb0e...builder.batDOS batch10/76Payload builder/delivery (1.35 MB)
90afcb37...agent-windows-amd64.exePE64 EXE37/76Multi-framework agent (Sliver/Quasar)
9f6d7226...bot.exePE64 (PyInstaller)37/76Python DDoS / KryptonC2
4304dfbd...SpoofSIP-3.22.3.zipZIP16/76VoIP spoofing lure (trojanized)
f3598e80...LarpExodus.zipZIP (multi-platform)11/76Gaming lure (PE+ELF+MachO)
6df41bed...c5c3d8f3fb503a06.batDOS batch25/76Netlify-relayed dropper

LarpExodus.zip is particularly notable — it contains PE, ELF, and MachO executables, indicating the actor targets Windows, Linux, AND macOS, with gaming community lures.

SpoofSIP-3.22.3.zip suggests targeting of VoIP/telephony professionals via trojanized software packages.


Attribution & Threat Actor Assessment

Confidence: MODERATE

Indicators

  • Tooling: Pulsar RAT is open-source (.NET, available on GitHub). Deployment of an open-source RAT with a custom GUID-shellcode loader suggests a technically capable actor who is either modifying existing tooling or procuring a custom loader as a service.

  • Infrastructure pattern: Multiple bloxfruitt.art subdomains with randomized names (kixlil, qfip, xcbtg, poplo, hucis, etc.) issued simultaneously suggests either:

    • A single actor running multiple concurrent campaigns, OR
    • A MaaS provider selling access to Pulsar RAT infrastructure
  • Cloudflare Workers abuse: The use of *.workers.dev as a C2 relay is a deliberate OPSEC choice — it prevents domain blocklisting because Cloudflare is a trusted CDN. The attacker's actual backend (31.57.147.207) remains hidden behind Cloudflare's infrastructure.

  • Backend VPS: Windows Server 2022 hosted at Sprious LLC (via GOLD IP L.L.C-FZ) in Frankfurt. Sprious LLC / 12651980 CANADA INC. is a hosting reseller commonly used by threat actors for bulletproof hosting. RDP and WinRM open suggest direct operator access.

  • Campaign breadth: The actor operates multi-tool campaigns combining:

    • Pulsar RAT (.NET) — credential theft, crypto hijack, RAT
    • Python DDoS bot (KryptonC2)
    • Cross-platform payloads (LarpExodus — Win/Linux/macOS)
    • Multiple delivery mechanisms (MSI, ZIP lures, BAT builders)
  • OPSEC mistakes:

    • Backend server runs Windows Server 2022 with default hostname (WIN-9QL4SDRB93L)
    • CVE-2020-0796 (SMBGhost) is unpatched on the server
    • SSL certificate for kixlil.bloxfruitt.art was issued for the backend IP, revealing the domain infrastructure even through the Cloudflare relay
    • All 13+ subdomains were issued certs simultaneously — single provisioning event
    • bloxfruitt.art registered via Namecheap (WHOIS redacted) — actor tried to hide identity but the mx.plingest.com MX record could be pivoted for email infrastructure
  • Targeting: Lures suggest mixed targeting — gaming community (LarpExodus), VoIP professionals (SpoofSIP), and general users (haunt.msi). No specific geography identified.


Infrastructure Map

┌─────────────────────────────────────────────────────────────────┐
│                    ACTOR INFRASTRUCTURE                         │
│                                                                 │
│  Domain Registrar: Namecheap                                    │
│  Domain: bloxfruitt.art (registered Dec 2024)                   │
│  MX: mx.plingest.com                                            │
│                                                                 │
│  Subdomains (all Let's Encrypt, Dec 2024):                      │
│  ┌─────────────────────────────────────────────┐                │
│  │ kixlil.bloxfruitt.art ←── SSL on backend    │                │
│  │ plxoq / qfip / xcbtg / poplo / hucis / ...  │                │
│  │ *.bloxfruitt.art (wildcard, renewed Dec 2025)│               │
│  └─────────────────────────────────────────────┘                │
│                                                                 │
│  ┌──────────────────────────────────────────────────────────┐   │
│  │ C2 BACKEND: 31.57.147.207 (Frankfurt, DE)                │   │
│  │   OS: Windows Server 2022  Host: WIN-9QL4SDRB93L         │   │
│  │   ISP: Sprious LLC (GOLD IP L.L.C-FZ, ASN 64267)         │   │
│  │   Ports: 135/139/445/3389/5985 (RDP open!)               │   │
│  │   Vuln: CVE-2020-0796 (SMBGhost)                         │   │
│  │   Cert: kixlil.bloxfruitt.art                            │   │
│  └──────────────────────────────────────────────────────────┘   │
│                                                                 │
│  C2 RELAYS (hiding backend):                                    │
│  ┌───────────────────────────────────────────┐                  │
│  │ Cloudflare Workers: fedmenigga.workers.dev│                  │
│  │ → host.fedmenigga.workers.dev             │                  │
│  │   Used by: haunt.msi, yuorw.exe,          │                  │
│  │           builder.bat                     │                  │
│  └───────────────────────────────────────────┘                  │
│  ┌────────────────────────────────────────────┐                 │
│  │ Netlify: dainty-boba-01d5e4.netlify.app    │                 │
│  │ → 98.84.224.111 (AWS us-east-1)            │                 │
│  │   Used by: Client.exe (25a8f876...)        │                 │
│  └────────────────────────────────────────────┘                 │
│                                                                 │
│  VICTIM GEOLOCATION API:                                        │
│  → https://ipwho.is/ (legitimate service, abused)              │
└─────────────────────────────────────────────────────────────────┘

Indicators of Compromise (IOCs)

File Hashes

SHA256MD5NameType
e4bd27de913a316b2033eb45baf21ba09ff05000a910542f7ffc50117b4aee267d19b113f3faf859bec3e2c89fc80e03haunt.msiMSI dropper
3aece208c19578481758a974aedc78ca72e4cfcbd0b5ab82f4c9b554ded1397982ea514557eb1a4886e5689700a0b8b5yuorw.exe / Client.exePulsar RAT
25a8f87617a8cd55508b3a6e9228ef2e60bd2cd124348e3e7be8708e3d383f26payload / Client.exePulsar RAT
5e77eb0ec4b743151f758a780ca692c91f3b75793a5882527af57bc8fb23b1a5builder.batRAT builder
90afcb372c775210d739b1d53e7e69676c3c7d2445602f8feddb3a835294e977agent-windows-amd64.exeMulti-framework
9f6d7226e97df77451818615cdc298ab256e52eb9fdb72fc5ed63f34a411f525bot.exePython DDoS

Network Indicators

IndicatorTypeRole
host.fedmenigga.workers.devDomainPRIMARY C2 RELAY
fedmenigga.workers.devDomainC2 relay base
31.57.147.207IPC2 BACKEND SERVER
kixlil.bloxfruitt.artDomainBackend SSL CN
bloxfruitt.artDomainBackend domain
dainty-boba-01d5e4.netlify.appDomainAlt C2 relay
172.234.24.211IPbloxfruitt.art apex
172.239.57.117IPbloxfruitt.art apex

Registry

KeyValuePurpose
HKCU\Software\Microsoft\Windows\CurrentVersion\Run(payload path)Persistence
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersionRead: InstallDateFingerprint
HKCR\CLSID\{6C683247-F56D-470B-AAFA-9E232B4F4FF0}COM registration
HKCU\Software\SEMPK\JJRIPKSKPinstalled=1MSI marker

Files

PathPurpose
%APPDATA%\Microsoft\Crypto\RSA\qyjbnsml\sml.dllHidden payload drop location
%TEMP%\cfgmgr.dllLoader DLL (masquerades as Windows cfgmgr.dll)

Mutexes / Unique Strings

IndicatorType
JJRIPKSKPMSI product name (unique per build)
SEMPKMSI manufacturer string
WIN-9QL4SDRB93LBackend server hostname
nGOYQVFxRyFLoader DLL export function name
RqaAvOHynShqLoader DLL export function name
{F33C6B39-ED26-432B-8E9A-20F3917C9583}MSI Revision Number (GUID)

Detection Notes

  • Low AV detection (5/76): The GUID-encoded shellcode and multi-layer obfuscation effectively evade most signature-based AV engines. Only generic detections fired.
  • AMSI bypass: Disables Windows Defender's script scanning before the .NET payload runs.
  • ETW bypass: Blind-spots EDR solutions that rely on ETW for behavioral telemetry.
  • Cloudflare C2: Domain blocklisting is ineffective — *.workers.dev cannot be blocked without disrupting legitimate Cloudflare Workers usage.
  • Hunt recommendation: Look for rundll32.exe loading from %TEMP%\cfgmgr.dll, or outbound HTTPS connections to *.workers.dev from unexpected processes.
Share