Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Snakes in the Castle: Inside the Walls of Python-Driven CastleLoader Delivery

0
Medium
Published: Mon Dec 15 2025 (12/15/2025, 09:05:27 UTC)
Source: AlienVault OTX General

Description

CastleLoader is a malware loader family delivered primarily via a social engineering technique known as ClickFix, which tricks users into running commands via the Windows Run dialog as a supposed 'human verification' step. This method has been widely used to deploy various malware types including information stealers and remote access trojans (RATs). CastleLoader is Python-driven and leverages this user interaction to execute malicious payloads. Indicators include hashes of malicious files and command-and-control infrastructure hosted on domains and IPs linked to Russia. Although no known exploits are currently active in the wild, the delivery technique’s reliance on social engineering and user action makes it a persistent medium threat. The severity is assessed as medium due to the need for user interaction and the potential for data theft or unauthorized access. European organizations should be vigilant, especially those with users susceptible to social engineering or lacking robust endpoint controls.

AI-Powered Analysis

AILast updated: 12/15/2025, 09:30:22 UTC

Technical Analysis

The threat known as CastleLoader is a malware loader family that has been increasingly delivered through a social engineering technique called ClickFix. This technique involves convincing users to press Win + R to open the Windows Run dialog and enter a command under the guise of a harmless 'human verification' or similar prompt. This user-driven execution vector is exploited to deploy various malware payloads, including information stealers and remote access trojans (RATs). CastleLoader itself is Python-driven, which suggests it uses Python scripts or interpreters to facilitate its loading and execution processes, potentially increasing its flexibility and evasion capabilities. The Blackpoint SOC recently encountered an incident involving this delivery method, highlighting its ongoing use in active campaigns. Indicators of compromise include specific file hashes and network infrastructure such as IP 78.153.155.131 (associated with a Russian ASN) and domains like dperforms.info, which host malicious payloads. The attack leverages MITRE ATT&CK techniques such as T1059.006 (Command and Scripting Interpreter: Windows Command Shell), T1181 (Exploitation for Defense Evasion), and T1573 (Encrypted Channel), indicating sophisticated evasion and communication methods. Although no known exploits are currently reported in the wild, the reliance on social engineering and user interaction means the threat persists as a viable delivery vector. The medium severity rating reflects the balance between the impact potential and the requirement for user action to initiate the infection.

Potential Impact

For European organizations, the CastleLoader threat poses a risk primarily through successful social engineering that leads to malware execution. If deployed, CastleLoader can facilitate the installation of information stealers or RATs, potentially compromising sensitive data confidentiality and enabling unauthorized remote access. This could lead to data breaches, espionage, or lateral movement within networks. The use of Python scripts may allow attackers to adapt payloads quickly, complicating detection and response efforts. The threat is particularly concerning for sectors with high-value data or critical infrastructure, as attackers could leverage access for espionage or disruption. The requirement for user interaction reduces the likelihood of widespread automated infection but does not eliminate risk, especially in environments with insufficient user training or endpoint protections. The presence of command-and-control infrastructure linked to Russia may also raise geopolitical concerns, potentially targeting organizations involved in sectors sensitive to Eastern European cyber operations. Overall, the impact includes potential loss of data confidentiality, integrity, and availability, with moderate difficulty in exploitation due to social engineering dependence.

Mitigation Recommendations

To mitigate CastleLoader threats, European organizations should implement targeted user awareness training focused on the dangers of social engineering techniques like ClickFix, emphasizing the risks of executing unsolicited commands via the Run dialog. Endpoint detection and response (EDR) solutions should be configured to monitor and alert on suspicious use of the Windows Run dialog and unusual Python script executions. Network defenses should block or closely monitor traffic to known malicious domains and IP addresses such as dperforms.info and 78.153.155.131. Application whitelisting can prevent unauthorized execution of unknown scripts or binaries. Multi-factor authentication and strict privilege management reduce the impact of potential RAT deployments. Incident response plans should include procedures for rapid containment and forensic analysis of infections involving CastleLoader. Regular threat intelligence updates should be consumed to stay informed about evolving indicators and tactics. Finally, disabling or restricting the use of the Windows Run dialog for non-administrative users where feasible can reduce the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
[]
Adversary
null
Pulse Id
693fcf58dfddb4ef856b099a
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash0f5c3ac4b4f997acd2cd71c451082cd8fbd1cbdb1a6db2bdf470714f2e7ef4bb
hash8a539355d317bd8a490f470319410e5d2a2851a38828c900f357fbac9083583c
hashbfea06a7ef5b25b40178cfffd802d8ab4f5ee35ca5cd8d2b9ff29b4e201b3b7f

Ip

ValueDescriptionCopy
ip78.153.155.131
CC=RU ASN=AS45027 llc internet tehnologii

Url

ValueDescriptionCopy
urlhttp://78.153.155.131/service/download/p2.tar
urlhttp://dperforms.info/service/download/load_1

Domain

ValueDescriptionCopy
domaindperforms.info

Threat ID: 693fd19fd9bcdf3f3dc76eba

Added to database: 12/15/2025, 9:15:11 AM

Last enriched: 12/15/2025, 9:30:22 AM

Last updated: 12/15/2025, 9:47:18 PM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats