Snakes in the Castle: Inside the Walls of Python-Driven CastleLoader Delivery
The Blackpoint SOC recently responded to an incident initiated through the tried-and-true ClickFix technique; a social engineering method consistently leveraged across numerous campaigns this past year. These lures convince users to press Win + R to open the Windows Run dialog box, then enter a command presented as a harmless “human verification” step or similar prompt. This pattern has been repeatedly used to deploy everything from information stealers to remote access trojans (RATs), and it has also become one of the primary delivery vectors for a newer loader family known as CastleLoader.
AI Analysis
Technical Summary
The threat known as CastleLoader is a malware loader family that has been increasingly delivered through a social engineering technique called ClickFix. This technique involves convincing users to press Win + R to open the Windows Run dialog and enter a command under the guise of a harmless 'human verification' or similar prompt. This user-driven execution vector is exploited to deploy various malware payloads, including information stealers and remote access trojans (RATs). CastleLoader itself is Python-driven, which suggests it uses Python scripts or interpreters to facilitate its loading and execution processes, potentially increasing its flexibility and evasion capabilities. The Blackpoint SOC recently encountered an incident involving this delivery method, highlighting its ongoing use in active campaigns. Indicators of compromise include specific file hashes and network infrastructure such as IP 78.153.155.131 (associated with a Russian ASN) and domains like dperforms.info, which host malicious payloads. The attack leverages MITRE ATT&CK techniques such as T1059.006 (Command and Scripting Interpreter: Windows Command Shell), T1181 (Exploitation for Defense Evasion), and T1573 (Encrypted Channel), indicating sophisticated evasion and communication methods. Although no known exploits are currently reported in the wild, the reliance on social engineering and user interaction means the threat persists as a viable delivery vector. The medium severity rating reflects the balance between the impact potential and the requirement for user action to initiate the infection.
Potential Impact
For European organizations, the CastleLoader threat poses a risk primarily through successful social engineering that leads to malware execution. If deployed, CastleLoader can facilitate the installation of information stealers or RATs, potentially compromising sensitive data confidentiality and enabling unauthorized remote access. This could lead to data breaches, espionage, or lateral movement within networks. The use of Python scripts may allow attackers to adapt payloads quickly, complicating detection and response efforts. The threat is particularly concerning for sectors with high-value data or critical infrastructure, as attackers could leverage access for espionage or disruption. The requirement for user interaction reduces the likelihood of widespread automated infection but does not eliminate risk, especially in environments with insufficient user training or endpoint protections. The presence of command-and-control infrastructure linked to Russia may also raise geopolitical concerns, potentially targeting organizations involved in sectors sensitive to Eastern European cyber operations. Overall, the impact includes potential loss of data confidentiality, integrity, and availability, with moderate difficulty in exploitation due to social engineering dependence.
Mitigation Recommendations
To mitigate CastleLoader threats, European organizations should implement targeted user awareness training focused on the dangers of social engineering techniques like ClickFix, emphasizing the risks of executing unsolicited commands via the Run dialog. Endpoint detection and response (EDR) solutions should be configured to monitor and alert on suspicious use of the Windows Run dialog and unusual Python script executions. Network defenses should block or closely monitor traffic to known malicious domains and IP addresses such as dperforms.info and 78.153.155.131. Application whitelisting can prevent unauthorized execution of unknown scripts or binaries. Multi-factor authentication and strict privilege management reduce the impact of potential RAT deployments. Incident response plans should include procedures for rapid containment and forensic analysis of infections involving CastleLoader. Regular threat intelligence updates should be consumed to stay informed about evolving indicators and tactics. Finally, disabling or restricting the use of the Windows Run dialog for non-administrative users where feasible can reduce the attack surface.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
Indicators of Compromise
- hash: 0f5c3ac4b4f997acd2cd71c451082cd8fbd1cbdb1a6db2bdf470714f2e7ef4bb
- hash: 8a539355d317bd8a490f470319410e5d2a2851a38828c900f357fbac9083583c
- hash: bfea06a7ef5b25b40178cfffd802d8ab4f5ee35ca5cd8d2b9ff29b4e201b3b7f
- ip: 78.153.155.131
- url: http://78.153.155.131/service/download/p2.tar
- url: http://dperforms.info/service/download/load_1
- domain: dperforms.info
Snakes in the Castle: Inside the Walls of Python-Driven CastleLoader Delivery
Description
The Blackpoint SOC recently responded to an incident initiated through the tried-and-true ClickFix technique; a social engineering method consistently leveraged across numerous campaigns this past year. These lures convince users to press Win + R to open the Windows Run dialog box, then enter a command presented as a harmless “human verification” step or similar prompt. This pattern has been repeatedly used to deploy everything from information stealers to remote access trojans (RATs), and it has also become one of the primary delivery vectors for a newer loader family known as CastleLoader.
AI-Powered Analysis
Technical Analysis
The threat known as CastleLoader is a malware loader family that has been increasingly delivered through a social engineering technique called ClickFix. This technique involves convincing users to press Win + R to open the Windows Run dialog and enter a command under the guise of a harmless 'human verification' or similar prompt. This user-driven execution vector is exploited to deploy various malware payloads, including information stealers and remote access trojans (RATs). CastleLoader itself is Python-driven, which suggests it uses Python scripts or interpreters to facilitate its loading and execution processes, potentially increasing its flexibility and evasion capabilities. The Blackpoint SOC recently encountered an incident involving this delivery method, highlighting its ongoing use in active campaigns. Indicators of compromise include specific file hashes and network infrastructure such as IP 78.153.155.131 (associated with a Russian ASN) and domains like dperforms.info, which host malicious payloads. The attack leverages MITRE ATT&CK techniques such as T1059.006 (Command and Scripting Interpreter: Windows Command Shell), T1181 (Exploitation for Defense Evasion), and T1573 (Encrypted Channel), indicating sophisticated evasion and communication methods. Although no known exploits are currently reported in the wild, the reliance on social engineering and user interaction means the threat persists as a viable delivery vector. The medium severity rating reflects the balance between the impact potential and the requirement for user action to initiate the infection.
Potential Impact
For European organizations, the CastleLoader threat poses a risk primarily through successful social engineering that leads to malware execution. If deployed, CastleLoader can facilitate the installation of information stealers or RATs, potentially compromising sensitive data confidentiality and enabling unauthorized remote access. This could lead to data breaches, espionage, or lateral movement within networks. The use of Python scripts may allow attackers to adapt payloads quickly, complicating detection and response efforts. The threat is particularly concerning for sectors with high-value data or critical infrastructure, as attackers could leverage access for espionage or disruption. The requirement for user interaction reduces the likelihood of widespread automated infection but does not eliminate risk, especially in environments with insufficient user training or endpoint protections. The presence of command-and-control infrastructure linked to Russia may also raise geopolitical concerns, potentially targeting organizations involved in sectors sensitive to Eastern European cyber operations. Overall, the impact includes potential loss of data confidentiality, integrity, and availability, with moderate difficulty in exploitation due to social engineering dependence.
Mitigation Recommendations
To mitigate CastleLoader threats, European organizations should implement targeted user awareness training focused on the dangers of social engineering techniques like ClickFix, emphasizing the risks of executing unsolicited commands via the Run dialog. Endpoint detection and response (EDR) solutions should be configured to monitor and alert on suspicious use of the Windows Run dialog and unusual Python script executions. Network defenses should block or closely monitor traffic to known malicious domains and IP addresses such as dperforms.info and 78.153.155.131. Application whitelisting can prevent unauthorized execution of unknown scripts or binaries. Multi-factor authentication and strict privilege management reduce the impact of potential RAT deployments. Incident response plans should include procedures for rapid containment and forensic analysis of infections involving CastleLoader. Regular threat intelligence updates should be consumed to stay informed about evolving indicators and tactics. Finally, disabling or restricting the use of the Windows Run dialog for non-administrative users where feasible can reduce the attack surface.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- []
- Adversary
- null
- Pulse Id
- 693fcf58dfddb4ef856b099a
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash0f5c3ac4b4f997acd2cd71c451082cd8fbd1cbdb1a6db2bdf470714f2e7ef4bb | — | |
hash8a539355d317bd8a490f470319410e5d2a2851a38828c900f357fbac9083583c | — | |
hashbfea06a7ef5b25b40178cfffd802d8ab4f5ee35ca5cd8d2b9ff29b4e201b3b7f | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip78.153.155.131 | CC=RU ASN=AS45027 llc internet tehnologii |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://78.153.155.131/service/download/p2.tar | — | |
urlhttp://dperforms.info/service/download/load_1 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domaindperforms.info | — |
Threat ID: 693fd19fd9bcdf3f3dc76eba
Added to database: 12/15/2025, 9:15:11 AM
Last enriched: 12/15/2025, 9:30:22 AM
Last updated: 2/4/2026, 8:02:37 PM
Views: 141
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
341 Malicious Clawed Skills Found by the Bot They Were Targeting
MediumAPT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks
MediumMicrosoft Warns Python Infostealers Target macOS via Fake Ads and Installers
MediumThreatFox IOCs for 2026-02-03
MediumNotepad++ supply chain attack breakdown
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.