CastleRAT attack first to abuse Deno JavaScript runtime to evade enterprise security
A sophisticated infection chain has been discovered that installs CastleRAT malware without leaving traces on disk. The attack uniquely abuses the Deno runtime as a malicious framework, combining social engineering, steganography, and in-memory execution to evade detection. The process involves tricking users into executing a command, installing Deno, running obfuscated JavaScript, and decoding a payload hidden in a JPEG image. CastleRAT then gains total control, performing host fingerprinting, keylogging, clipboard hijacking, digital identity theft, and audio/video surveillance. This campaign demonstrates the evolution of malware towards invisibility and the need for advanced endpoint behavioral monitoring to detect such threats.
AI Analysis
Technical Summary
The CastleRAT malware campaign represents a novel and sophisticated threat leveraging the Deno JavaScript runtime environment as a malicious framework to evade detection by traditional security solutions. The attack chain begins with social engineering tactics that convince victims to execute a crafted command, which installs the Deno runtime if not already present. Deno is then used to run heavily obfuscated JavaScript code that performs steganographic decoding of a malicious payload hidden within a JPEG image file. This payload, CastleRAT, is executed entirely in-memory, avoiding any disk writes and thus evading file-based detection mechanisms. CastleRAT gains comprehensive control over the infected host, performing host fingerprinting to gather system information, keylogging to capture user input, clipboard hijacking to steal copied data, digital identity theft, and even audio/video surveillance through connected peripherals. The malware abuses various APIs and techniques such as process injection, command and control communication, and credential theft. The campaign's use of Deno is unprecedented, marking a shift in malware development towards abusing legitimate, modern runtimes to bypass endpoint security. Indicators of compromise include specific IP addresses (e.g., 23.94.145.120), multiple file hashes, and malicious domains like serialmenot.com and dsennbuappec.zhivachkapro.com. Although no public exploits or threat actor attribution are currently known, the campaign underscores the need for advanced detection strategies focusing on behavioral analysis and memory forensics.
Potential Impact
Organizations worldwide face significant risks from this CastleRAT campaign due to its stealthy infection vector and advanced evasion techniques. The in-memory execution without disk artifacts severely limits detection by traditional antivirus and endpoint protection platforms, increasing the likelihood of prolonged undetected presence. The malware’s capabilities—keylogging, clipboard hijacking, digital identity theft, and audio/video surveillance—pose severe confidentiality and privacy risks, potentially leading to data breaches, intellectual property theft, and espionage. Host fingerprinting enables attackers to tailor further attacks or lateral movement within networks. Enterprises relying on user trust and manual execution of commands are particularly vulnerable to social engineering exploitation. The campaign’s use of a legitimate runtime (Deno) complicates detection and response, potentially impacting sectors with high-value targets such as finance, government, healthcare, and technology. The stealth and persistence of CastleRAT could disrupt business operations and damage organizational reputation if sensitive data or communications are compromised.
Mitigation Recommendations
To mitigate the threat posed by CastleRAT, organizations should implement multi-layered defenses focusing on behavioral and runtime analysis rather than solely signature-based detection. Specifically: 1) Enforce strict application whitelisting policies that restrict unauthorized installation and execution of runtimes like Deno, especially from untrusted sources. 2) Deploy advanced endpoint detection and response (EDR) solutions capable of monitoring in-memory execution, API abuse, and anomalous process behaviors. 3) Implement network monitoring to detect suspicious communications to known malicious IPs and domains such as 23.94.145.120, serialmenot.com, and dsennbuappec.zhivachkapro.com. 4) Educate users to recognize and resist social engineering attempts, particularly commands prompting runtime installations or execution of scripts. 5) Utilize steganalysis tools to inspect suspicious image files in email attachments or downloads. 6) Regularly audit and restrict permissions to prevent unauthorized runtime installations and script executions. 7) Employ multi-factor authentication and credential hygiene to reduce the impact of credential theft. 8) Conduct memory forensics and behavioral analytics to identify indicators of in-memory malware activity. 9) Maintain up-to-date threat intelligence feeds to incorporate emerging indicators and tactics. 10) Establish incident response playbooks tailored to runtime abuse and in-memory malware scenarios.
Affected Countries
United States, United Kingdom, Germany, France, Canada, Australia, Japan, South Korea, India, Netherlands, Singapore
Indicators of Compromise
- ip: 23.94.145.120
- hash: ca37e31d651bbd5bbddef3ea716b8b4f
- hash: de9707a8505683930fccf5536e311242425d420a
- hash: a4787a42070994b7f1222025828faf9b153710bb730e58da710728e148282e28
- hash: bd8203ab88983bc081545ff325f39e9c5cd5eb6a99d04ae2a6cf862535c9829a
- domain: serialmenot.com
- domain: dsennbuappec.zhivachkapro.com
CastleRAT attack first to abuse Deno JavaScript runtime to evade enterprise security
Description
A sophisticated infection chain has been discovered that installs CastleRAT malware without leaving traces on disk. The attack uniquely abuses the Deno runtime as a malicious framework, combining social engineering, steganography, and in-memory execution to evade detection. The process involves tricking users into executing a command, installing Deno, running obfuscated JavaScript, and decoding a payload hidden in a JPEG image. CastleRAT then gains total control, performing host fingerprinting, keylogging, clipboard hijacking, digital identity theft, and audio/video surveillance. This campaign demonstrates the evolution of malware towards invisibility and the need for advanced endpoint behavioral monitoring to detect such threats.
AI-Powered Analysis
Technical Analysis
The CastleRAT malware campaign represents a novel and sophisticated threat leveraging the Deno JavaScript runtime environment as a malicious framework to evade detection by traditional security solutions. The attack chain begins with social engineering tactics that convince victims to execute a crafted command, which installs the Deno runtime if not already present. Deno is then used to run heavily obfuscated JavaScript code that performs steganographic decoding of a malicious payload hidden within a JPEG image file. This payload, CastleRAT, is executed entirely in-memory, avoiding any disk writes and thus evading file-based detection mechanisms. CastleRAT gains comprehensive control over the infected host, performing host fingerprinting to gather system information, keylogging to capture user input, clipboard hijacking to steal copied data, digital identity theft, and even audio/video surveillance through connected peripherals. The malware abuses various APIs and techniques such as process injection, command and control communication, and credential theft. The campaign's use of Deno is unprecedented, marking a shift in malware development towards abusing legitimate, modern runtimes to bypass endpoint security. Indicators of compromise include specific IP addresses (e.g., 23.94.145.120), multiple file hashes, and malicious domains like serialmenot.com and dsennbuappec.zhivachkapro.com. Although no public exploits or threat actor attribution are currently known, the campaign underscores the need for advanced detection strategies focusing on behavioral analysis and memory forensics.
Potential Impact
Organizations worldwide face significant risks from this CastleRAT campaign due to its stealthy infection vector and advanced evasion techniques. The in-memory execution without disk artifacts severely limits detection by traditional antivirus and endpoint protection platforms, increasing the likelihood of prolonged undetected presence. The malware’s capabilities—keylogging, clipboard hijacking, digital identity theft, and audio/video surveillance—pose severe confidentiality and privacy risks, potentially leading to data breaches, intellectual property theft, and espionage. Host fingerprinting enables attackers to tailor further attacks or lateral movement within networks. Enterprises relying on user trust and manual execution of commands are particularly vulnerable to social engineering exploitation. The campaign’s use of a legitimate runtime (Deno) complicates detection and response, potentially impacting sectors with high-value targets such as finance, government, healthcare, and technology. The stealth and persistence of CastleRAT could disrupt business operations and damage organizational reputation if sensitive data or communications are compromised.
Mitigation Recommendations
To mitigate the threat posed by CastleRAT, organizations should implement multi-layered defenses focusing on behavioral and runtime analysis rather than solely signature-based detection. Specifically: 1) Enforce strict application whitelisting policies that restrict unauthorized installation and execution of runtimes like Deno, especially from untrusted sources. 2) Deploy advanced endpoint detection and response (EDR) solutions capable of monitoring in-memory execution, API abuse, and anomalous process behaviors. 3) Implement network monitoring to detect suspicious communications to known malicious IPs and domains such as 23.94.145.120, serialmenot.com, and dsennbuappec.zhivachkapro.com. 4) Educate users to recognize and resist social engineering attempts, particularly commands prompting runtime installations or execution of scripts. 5) Utilize steganalysis tools to inspect suspicious image files in email attachments or downloads. 6) Regularly audit and restrict permissions to prevent unauthorized runtime installations and script executions. 7) Employ multi-factor authentication and credential hygiene to reduce the impact of credential theft. 8) Conduct memory forensics and behavioral analytics to identify indicators of in-memory malware activity. 9) Maintain up-to-date threat intelligence feeds to incorporate emerging indicators and tactics. 10) Establish incident response playbooks tailored to runtime abuse and in-memory malware scenarios.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.threatdown.com/blog/castlerat-cyber-attack-is-the-first-to-abuse-deno-javascript-runtime-to-evade-enterprise-security/"]
- Adversary
- null
- Pulse Id
- 69b14da6cb1bf921c7ac6d22
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip23.94.145.120 | — |
Hash
| Value | Description | Copy |
|---|---|---|
hashca37e31d651bbd5bbddef3ea716b8b4f | — | |
hashde9707a8505683930fccf5536e311242425d420a | — | |
hasha4787a42070994b7f1222025828faf9b153710bb730e58da710728e148282e28 | — | |
hashbd8203ab88983bc081545ff325f39e9c5cd5eb6a99d04ae2a6cf862535c9829a | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainserialmenot.com | — | |
domaindsennbuappec.zhivachkapro.com | — |
Threat ID: 69b7c7d69d4df451833e08e1
Added to database: 3/16/2026, 9:05:26 AM
Last enriched: 3/16/2026, 9:20:17 AM
Last updated: 3/16/2026, 8:44:09 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.