Snakes in the Castle: Inside the Walls of Python-Driven CastleLoader Delivery
CastleLoader is a malware loader family delivered primarily via a social engineering technique known as ClickFix, which tricks users into running commands via the Windows Run dialog as a supposed 'human verification' step. This method has been widely used to deploy various malware types including information stealers and remote access trojans (RATs). CastleLoader is Python-driven and leverages this user interaction to execute malicious payloads. Indicators include hashes of malicious files and command-and-control infrastructure hosted on domains and IPs linked to Russia. Although no known exploits are currently active in the wild, the delivery technique’s reliance on social engineering and user action makes it a persistent medium threat. The severity is assessed as medium due to the need for user interaction and the potential for data theft or unauthorized access. European organizations should be vigilant, especially those with users susceptible to social engineering or lacking robust endpoint controls.
AI Analysis
Technical Summary
The threat known as CastleLoader is a malware loader family that has been increasingly delivered through a social engineering technique called ClickFix. This technique involves convincing users to press Win + R to open the Windows Run dialog and enter a command under the guise of a harmless 'human verification' or similar prompt. This user-driven execution vector is exploited to deploy various malware payloads, including information stealers and remote access trojans (RATs). CastleLoader itself is Python-driven, which suggests it uses Python scripts or interpreters to facilitate its loading and execution processes, potentially increasing its flexibility and evasion capabilities. The Blackpoint SOC recently encountered an incident involving this delivery method, highlighting its ongoing use in active campaigns. Indicators of compromise include specific file hashes and network infrastructure such as IP 78.153.155.131 (associated with a Russian ASN) and domains like dperforms.info, which host malicious payloads. The attack leverages MITRE ATT&CK techniques such as T1059.006 (Command and Scripting Interpreter: Windows Command Shell), T1181 (Exploitation for Defense Evasion), and T1573 (Encrypted Channel), indicating sophisticated evasion and communication methods. Although no known exploits are currently reported in the wild, the reliance on social engineering and user interaction means the threat persists as a viable delivery vector. The medium severity rating reflects the balance between the impact potential and the requirement for user action to initiate the infection.
Potential Impact
For European organizations, the CastleLoader threat poses a risk primarily through successful social engineering that leads to malware execution. If deployed, CastleLoader can facilitate the installation of information stealers or RATs, potentially compromising sensitive data confidentiality and enabling unauthorized remote access. This could lead to data breaches, espionage, or lateral movement within networks. The use of Python scripts may allow attackers to adapt payloads quickly, complicating detection and response efforts. The threat is particularly concerning for sectors with high-value data or critical infrastructure, as attackers could leverage access for espionage or disruption. The requirement for user interaction reduces the likelihood of widespread automated infection but does not eliminate risk, especially in environments with insufficient user training or endpoint protections. The presence of command-and-control infrastructure linked to Russia may also raise geopolitical concerns, potentially targeting organizations involved in sectors sensitive to Eastern European cyber operations. Overall, the impact includes potential loss of data confidentiality, integrity, and availability, with moderate difficulty in exploitation due to social engineering dependence.
Mitigation Recommendations
To mitigate CastleLoader threats, European organizations should implement targeted user awareness training focused on the dangers of social engineering techniques like ClickFix, emphasizing the risks of executing unsolicited commands via the Run dialog. Endpoint detection and response (EDR) solutions should be configured to monitor and alert on suspicious use of the Windows Run dialog and unusual Python script executions. Network defenses should block or closely monitor traffic to known malicious domains and IP addresses such as dperforms.info and 78.153.155.131. Application whitelisting can prevent unauthorized execution of unknown scripts or binaries. Multi-factor authentication and strict privilege management reduce the impact of potential RAT deployments. Incident response plans should include procedures for rapid containment and forensic analysis of infections involving CastleLoader. Regular threat intelligence updates should be consumed to stay informed about evolving indicators and tactics. Finally, disabling or restricting the use of the Windows Run dialog for non-administrative users where feasible can reduce the attack surface.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
Indicators of Compromise
- hash: 0f5c3ac4b4f997acd2cd71c451082cd8fbd1cbdb1a6db2bdf470714f2e7ef4bb
- hash: 8a539355d317bd8a490f470319410e5d2a2851a38828c900f357fbac9083583c
- hash: bfea06a7ef5b25b40178cfffd802d8ab4f5ee35ca5cd8d2b9ff29b4e201b3b7f
- ip: 78.153.155.131
- url: http://78.153.155.131/service/download/p2.tar
- url: http://dperforms.info/service/download/load_1
- domain: dperforms.info
Snakes in the Castle: Inside the Walls of Python-Driven CastleLoader Delivery
Description
CastleLoader is a malware loader family delivered primarily via a social engineering technique known as ClickFix, which tricks users into running commands via the Windows Run dialog as a supposed 'human verification' step. This method has been widely used to deploy various malware types including information stealers and remote access trojans (RATs). CastleLoader is Python-driven and leverages this user interaction to execute malicious payloads. Indicators include hashes of malicious files and command-and-control infrastructure hosted on domains and IPs linked to Russia. Although no known exploits are currently active in the wild, the delivery technique’s reliance on social engineering and user action makes it a persistent medium threat. The severity is assessed as medium due to the need for user interaction and the potential for data theft or unauthorized access. European organizations should be vigilant, especially those with users susceptible to social engineering or lacking robust endpoint controls.
AI-Powered Analysis
Technical Analysis
The threat known as CastleLoader is a malware loader family that has been increasingly delivered through a social engineering technique called ClickFix. This technique involves convincing users to press Win + R to open the Windows Run dialog and enter a command under the guise of a harmless 'human verification' or similar prompt. This user-driven execution vector is exploited to deploy various malware payloads, including information stealers and remote access trojans (RATs). CastleLoader itself is Python-driven, which suggests it uses Python scripts or interpreters to facilitate its loading and execution processes, potentially increasing its flexibility and evasion capabilities. The Blackpoint SOC recently encountered an incident involving this delivery method, highlighting its ongoing use in active campaigns. Indicators of compromise include specific file hashes and network infrastructure such as IP 78.153.155.131 (associated with a Russian ASN) and domains like dperforms.info, which host malicious payloads. The attack leverages MITRE ATT&CK techniques such as T1059.006 (Command and Scripting Interpreter: Windows Command Shell), T1181 (Exploitation for Defense Evasion), and T1573 (Encrypted Channel), indicating sophisticated evasion and communication methods. Although no known exploits are currently reported in the wild, the reliance on social engineering and user interaction means the threat persists as a viable delivery vector. The medium severity rating reflects the balance between the impact potential and the requirement for user action to initiate the infection.
Potential Impact
For European organizations, the CastleLoader threat poses a risk primarily through successful social engineering that leads to malware execution. If deployed, CastleLoader can facilitate the installation of information stealers or RATs, potentially compromising sensitive data confidentiality and enabling unauthorized remote access. This could lead to data breaches, espionage, or lateral movement within networks. The use of Python scripts may allow attackers to adapt payloads quickly, complicating detection and response efforts. The threat is particularly concerning for sectors with high-value data or critical infrastructure, as attackers could leverage access for espionage or disruption. The requirement for user interaction reduces the likelihood of widespread automated infection but does not eliminate risk, especially in environments with insufficient user training or endpoint protections. The presence of command-and-control infrastructure linked to Russia may also raise geopolitical concerns, potentially targeting organizations involved in sectors sensitive to Eastern European cyber operations. Overall, the impact includes potential loss of data confidentiality, integrity, and availability, with moderate difficulty in exploitation due to social engineering dependence.
Mitigation Recommendations
To mitigate CastleLoader threats, European organizations should implement targeted user awareness training focused on the dangers of social engineering techniques like ClickFix, emphasizing the risks of executing unsolicited commands via the Run dialog. Endpoint detection and response (EDR) solutions should be configured to monitor and alert on suspicious use of the Windows Run dialog and unusual Python script executions. Network defenses should block or closely monitor traffic to known malicious domains and IP addresses such as dperforms.info and 78.153.155.131. Application whitelisting can prevent unauthorized execution of unknown scripts or binaries. Multi-factor authentication and strict privilege management reduce the impact of potential RAT deployments. Incident response plans should include procedures for rapid containment and forensic analysis of infections involving CastleLoader. Regular threat intelligence updates should be consumed to stay informed about evolving indicators and tactics. Finally, disabling or restricting the use of the Windows Run dialog for non-administrative users where feasible can reduce the attack surface.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- []
- Adversary
- null
- Pulse Id
- 693fcf58dfddb4ef856b099a
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash0f5c3ac4b4f997acd2cd71c451082cd8fbd1cbdb1a6db2bdf470714f2e7ef4bb | — | |
hash8a539355d317bd8a490f470319410e5d2a2851a38828c900f357fbac9083583c | — | |
hashbfea06a7ef5b25b40178cfffd802d8ab4f5ee35ca5cd8d2b9ff29b4e201b3b7f | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip78.153.155.131 | CC=RU ASN=AS45027 llc internet tehnologii |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://78.153.155.131/service/download/p2.tar | — | |
urlhttp://dperforms.info/service/download/load_1 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domaindperforms.info | — |
Threat ID: 693fd19fd9bcdf3f3dc76eba
Added to database: 12/15/2025, 9:15:11 AM
Last enriched: 12/15/2025, 9:30:22 AM
Last updated: 12/15/2025, 9:47:18 PM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Kunai Analysis Report - Malware Sample Abusing Open Recursive DNS for Exfiltration
MediumFrogblight banking Trojan targets Android users in Turkey
MediumGoogle Sees 5 Chinese Groups Exploiting React2Shell for Malware Delivery
MediumHamas Linked Hackers Using AshTag Malware Against Diplomatic Offices
MediumThreatFox IOCs for 2025-12-14
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.