When Malware Talks Back
Pulsar RAT is a sophisticated multi-stage Windows malware campaign that uses living-off-the-land techniques and in-memory payload execution to evade detection. It begins with a hidden batch file that launches an embedded PowerShell loader, which injects shellcode into legitimate Windows processes using Donut technology. The final payload is a heavily obfuscated . NET framework that employs advanced anti-analysis methods, credential harvesting, surveillance, and remote control capabilities. Data exfiltration is conducted via Discord webhooks and Telegram bots, enabling stealthy communication and data theft. The malware supports live chat functionality and background payload deployment, indicating a focus on long-term persistence and large-scale data theft. It does not currently have known exploits in the wild but poses a medium severity threat due to its complexity and stealth. European organizations using Windows environments are at risk, especially those with high-value data and remote workforce setups. Mitigation requires targeted detection of living-off-the-land behaviors, monitoring of PowerShell and process injection activities, and blocking suspicious Discord and Telegram network traffic.
AI Analysis
Technical Summary
The Pulsar RAT malware campaign represents a modern, highly evasive Windows threat leveraging multiple advanced techniques to maintain stealth and persistence. The infection chain initiates with a concealed batch file that executes an embedded PowerShell loader. This loader then injects shellcode generated by the Donut tool into legitimate Windows processes, enabling in-memory execution that bypasses traditional disk-based detection mechanisms. The final payload is a heavily obfuscated .NET framework designed to resist reverse engineering and analysis through advanced anti-analysis techniques. Functionally, Pulsar RAT harvests credentials, conducts surveillance on the infected system, and provides remote system control to the attacker. Notably, it exfiltrates stolen data using Discord webhooks and Telegram bots, leveraging popular communication platforms to blend malicious traffic with legitimate network activity. The malware also features live chat capabilities, allowing attackers to interact in real-time with compromised hosts, and supports background payload deployment for ongoing operations. The use of living-off-the-land binaries and scripts (e.g., PowerShell) complicates detection, as these are legitimate system tools often whitelisted in enterprise environments. Although no known exploits are currently reported in the wild, the campaign’s sophisticated techniques and multi-stage infection chain make it a significant medium-level threat, particularly for organizations with Windows-based infrastructure and remote connectivity. The presence of multiple file hashes provides indicators of compromise for detection and response efforts.
Potential Impact
For European organizations, the Pulsar RAT campaign poses a substantial risk to confidentiality, integrity, and availability of critical systems and data. The malware’s credential harvesting capability can lead to unauthorized access to sensitive systems, enabling lateral movement and further compromise. Surveillance and remote control features threaten operational integrity and can facilitate espionage or sabotage. Data exfiltration through Discord and Telegram channels may bypass conventional network monitoring tools, increasing the risk of undetected data breaches. Organizations with remote workforces or those relying heavily on Windows environments are particularly vulnerable, as the malware exploits legitimate tools like PowerShell and process injection to evade detection. The long-term persistence and live chat functionality suggest attackers can maintain ongoing access, increasing the potential scale and duration of impact. This could lead to intellectual property theft, regulatory non-compliance (e.g., GDPR violations), financial losses, and reputational damage. The medium severity rating reflects the complexity and stealth of the malware, which may delay detection and remediation efforts.
Mitigation Recommendations
1. Implement advanced endpoint detection and response (EDR) solutions capable of monitoring and alerting on living-off-the-land techniques such as PowerShell execution, process injection, and in-memory shellcode execution. 2. Enforce strict PowerShell logging and enable script block logging to capture suspicious script activity. 3. Monitor network traffic for unusual or unauthorized connections to Discord webhooks and Telegram bot endpoints, and consider blocking or restricting these services at the network perimeter where appropriate. 4. Use application whitelisting to limit execution of unauthorized batch files and scripts, especially those launched from user directories or temporary locations. 5. Conduct regular credential audits and enforce multi-factor authentication (MFA) to reduce the impact of credential theft. 6. Employ behavioral analytics to detect anomalies such as live chat communications initiated by unknown processes. 7. Maintain updated threat intelligence feeds and integrate IoCs (hashes provided) into security tools for proactive detection. 8. Educate users on phishing and social engineering risks, as initial infection vectors often rely on user interaction. 9. Regularly patch and harden Windows systems to reduce attack surface, even though this malware uses living-off-the-land techniques. 10. Prepare incident response plans that include procedures for detecting and eradicating in-memory and obfuscated malware.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- hash: 0020b06dc2018cc2b5bf98945a39cbd3
- hash: 3abcad7678dd78832a164349aceeaa59
- hash: 648c0ba2bb1cde47fa8812f254821a72
- hash: 666493877fb7328c3e8c313fbcfdfd1e
- hash: 69392e0d2b877cb932ab709ebe758975
- hash: 0596efc427aebb99a4ec7f8d6a06f4777992fb08
- hash: dd5e51d3ea1d861d966d7e939d20befddd4620d3
- hash: 6aec480d0a66f008233875e99f4299d04a02ce755f812198c8bfc7d6d8ddf9d8
When Malware Talks Back
Description
Pulsar RAT is a sophisticated multi-stage Windows malware campaign that uses living-off-the-land techniques and in-memory payload execution to evade detection. It begins with a hidden batch file that launches an embedded PowerShell loader, which injects shellcode into legitimate Windows processes using Donut technology. The final payload is a heavily obfuscated . NET framework that employs advanced anti-analysis methods, credential harvesting, surveillance, and remote control capabilities. Data exfiltration is conducted via Discord webhooks and Telegram bots, enabling stealthy communication and data theft. The malware supports live chat functionality and background payload deployment, indicating a focus on long-term persistence and large-scale data theft. It does not currently have known exploits in the wild but poses a medium severity threat due to its complexity and stealth. European organizations using Windows environments are at risk, especially those with high-value data and remote workforce setups. Mitigation requires targeted detection of living-off-the-land behaviors, monitoring of PowerShell and process injection activities, and blocking suspicious Discord and Telegram network traffic.
AI-Powered Analysis
Technical Analysis
The Pulsar RAT malware campaign represents a modern, highly evasive Windows threat leveraging multiple advanced techniques to maintain stealth and persistence. The infection chain initiates with a concealed batch file that executes an embedded PowerShell loader. This loader then injects shellcode generated by the Donut tool into legitimate Windows processes, enabling in-memory execution that bypasses traditional disk-based detection mechanisms. The final payload is a heavily obfuscated .NET framework designed to resist reverse engineering and analysis through advanced anti-analysis techniques. Functionally, Pulsar RAT harvests credentials, conducts surveillance on the infected system, and provides remote system control to the attacker. Notably, it exfiltrates stolen data using Discord webhooks and Telegram bots, leveraging popular communication platforms to blend malicious traffic with legitimate network activity. The malware also features live chat capabilities, allowing attackers to interact in real-time with compromised hosts, and supports background payload deployment for ongoing operations. The use of living-off-the-land binaries and scripts (e.g., PowerShell) complicates detection, as these are legitimate system tools often whitelisted in enterprise environments. Although no known exploits are currently reported in the wild, the campaign’s sophisticated techniques and multi-stage infection chain make it a significant medium-level threat, particularly for organizations with Windows-based infrastructure and remote connectivity. The presence of multiple file hashes provides indicators of compromise for detection and response efforts.
Potential Impact
For European organizations, the Pulsar RAT campaign poses a substantial risk to confidentiality, integrity, and availability of critical systems and data. The malware’s credential harvesting capability can lead to unauthorized access to sensitive systems, enabling lateral movement and further compromise. Surveillance and remote control features threaten operational integrity and can facilitate espionage or sabotage. Data exfiltration through Discord and Telegram channels may bypass conventional network monitoring tools, increasing the risk of undetected data breaches. Organizations with remote workforces or those relying heavily on Windows environments are particularly vulnerable, as the malware exploits legitimate tools like PowerShell and process injection to evade detection. The long-term persistence and live chat functionality suggest attackers can maintain ongoing access, increasing the potential scale and duration of impact. This could lead to intellectual property theft, regulatory non-compliance (e.g., GDPR violations), financial losses, and reputational damage. The medium severity rating reflects the complexity and stealth of the malware, which may delay detection and remediation efforts.
Mitigation Recommendations
1. Implement advanced endpoint detection and response (EDR) solutions capable of monitoring and alerting on living-off-the-land techniques such as PowerShell execution, process injection, and in-memory shellcode execution. 2. Enforce strict PowerShell logging and enable script block logging to capture suspicious script activity. 3. Monitor network traffic for unusual or unauthorized connections to Discord webhooks and Telegram bot endpoints, and consider blocking or restricting these services at the network perimeter where appropriate. 4. Use application whitelisting to limit execution of unauthorized batch files and scripts, especially those launched from user directories or temporary locations. 5. Conduct regular credential audits and enforce multi-factor authentication (MFA) to reduce the impact of credential theft. 6. Employ behavioral analytics to detect anomalies such as live chat communications initiated by unknown processes. 7. Maintain updated threat intelligence feeds and integrate IoCs (hashes provided) into security tools for proactive detection. 8. Educate users on phishing and social engineering risks, as initial infection vectors often rely on user interaction. 9. Regularly patch and harden Windows systems to reduce attack surface, even though this malware uses living-off-the-land techniques. 10. Prepare incident response plans that include procedures for detecting and eradicating in-memory and obfuscated malware.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.pointwild.com/threat-intelligence/when-malware-talks-back"]
- Adversary
- null
- Pulse Id
- 697c7ba66b8f43dd7b4370c5
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash0020b06dc2018cc2b5bf98945a39cbd3 | — | |
hash3abcad7678dd78832a164349aceeaa59 | — | |
hash648c0ba2bb1cde47fa8812f254821a72 | — | |
hash666493877fb7328c3e8c313fbcfdfd1e | — | |
hash69392e0d2b877cb932ab709ebe758975 | — | |
hash0596efc427aebb99a4ec7f8d6a06f4777992fb08 | — | |
hashdd5e51d3ea1d861d966d7e939d20befddd4620d3 | — | |
hash6aec480d0a66f008233875e99f4299d04a02ce755f812198c8bfc7d6d8ddf9d8 | — |
Threat ID: 697ced97ac063202226a8793
Added to database: 1/30/2026, 5:42:47 PM
Last enriched: 1/30/2026, 5:57:08 PM
Last updated: 1/31/2026, 5:51:20 AM
Views: 31
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-01-30
MediumThreat Intelligence Dossier: TOXICSNAKE
MediumLABYRINTH CHOLLIMA Evolves into Three Adversaries
MediumMeet IClickFix: a widespread framework using the ClickFix tactic
MediumAttack on *stan: Your malware, my C2
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.