Pulsar RAT Targets Windows Systems via Per-User Run Key, Exfiltrates Sensitive Data


A sophisticated multi-stage malware campaign leveraging living-off-the-land techniques and in-memory payload delivery has been discovered targeting Windows systems.

The attack employs Pulsar RAT, a full-featured remote access trojan combined with advanced stealer capabilities, using evasion techniques designed to bypass traditional security controls and maintain persistent access.

The infection chain begins with a hidden batch file that establishes persistence through the per-user Run registry key at HKCUSoftwareMicrosoftWindowsCurrentVersionRun.

The malware creates a hidden folder within %APPDATA%Microsoft with randomized naming conventions to avoid detection during casual system inspection.

The batch file registers itself using a benign-looking value name, ensuring automatic execution at every user logon without requiring elevated privileges.

This persistence stub copies itself to the hidden location and employs a retry loop for robustness, ensuring the malware survives system reboots.

The batch file extracts an embedded Base64-encoded payload marked by a predefined delimiter, decoding it into a PowerShell script stored in the %TEMP% directory.

This PowerShell stage executes with a bypassed execution policy and implements self-cleaning mechanisms to minimize forensic artifacts.

Investigation uncovered a sophisticated, multi-stage malware campaign leveraging living-off-the-land techniques and in-memory payload delivery to evade traditional security controls.

The decoded script contains a large byte array that undergoes bitwise XOR decryption, revealing Donut-generated shellcode designed for position-independent execution.

The PowerShell loader performs classic CreateRemoteThread process injection, utilizing Win32 APIs including OpenProcess, VirtualAllocEx, WriteProcessMemory, and CreateRemoteThread.

After an intentional 80-second delay intended to evade behavioral monitoring systems, the shellcode is written into allocated memory with PAGE_EXECUTE_READWRITE permissions.

The malware implements a watchdog mechanism that continuously monitors the injected process, automatically migrating to explorer.exe whenever the current host terminates, ensuring resilient persistence.

Advanced Anti-Analysis Capabilities

The decrypted payload reveals a heavily obfuscated .NET assembly implementing comprehensive anti-analysis protections.

The malware performs extensive virtualization, sandbox, and emulation detection checks before execution, targeting automated analysis environments commonly used by security researchers.

A background thread continuously monitors for injected threads, suspicious memory base addresses, and both managed and native debuggers, immediately terminating upon detection of tampering.

Attack Flow (Source : Point Wild).

The malware employs user-mode anti-debugging through window enumeration, scanning active window titles for known reverse-engineering tools including x64dbg, WinDbg, dnSpy, and IDA.

Additionally, the payload conducts thorough system reconnaissance, collecting detailed operating system, process, and runtime information for environment profiling.

Pulsar RAT implements modular data exfiltration targeting remote administration tools including AnyDesk, TeamViewer, and PuTTY, FTP clients such as FileZilla and WinSCP, VPN software including NordVPN and ExpressVPN, messaging platforms like Discord and Telegram, gaming platforms including Steam and Epic Games, and developer tools such as GitHub and JetBrains.

After executing the XOR script, the decoded.bin file is written. We then determine what file type it is.

decoded.bin file info (Source : Point Wild).
decoded.bin file info (Source : Point Wild).

The stealer component harvests browser credentials, cookies, autofill data, credit cards, and authentication tokens across multiple profiles.

Command Infrastructure

The malware features real-time surveillance capabilities including clipboard monitoring for cryptocurrency wallet addresses, webcam activation with frame capture, and continuous audio recording using Windows Core Audio APIs.

The malware exfiltrates these archives through Discord webhooks and Telegram Bot API endpoints, sending multipart POST requests with victim metadata including username, machine name, OS version, and malware version.

System control features allow remote attackers to turn on or off Task Manager and User Account Control, significantly reducing user visibility and resistance.

Stolen data is aggregated into ZIP archives containing a detailed summary file labeled “InteliX by dead artis” associated with the threat actor @aesxor.

Indicators of compromise

MD5 HashFilenameDescription
648c0ba2bb1cde47fa8812f254821a720a1a98b5f9fc7c62.batBatch script file
69392e0d2b877cb932ab709ebe758975ps_7b948266.ps1PowerShell script
666493877fb7328c3e8c313fbcfdfd1eClient.exeExecutable client component
0020b06dc2018cc2b5bf98945a39cbd3Pulsar.Common.dllAssociated DLL module
3abcad7678dd78832a164349aceeaa59Stealerv37.dllPotential stealer module
185[.]132[.]53[.]17:7800Command & Control (C2) Domain

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link