When Malware Talks Back
A sophisticated multi-stage malware campaign employs living-off-the-land techniques and in-memory payload delivery to evade security controls. The infection chain begins with a hidden batch file that executes an embedded PowerShell loader, which then injects Donut-generated shellcode into legitimate Windows processes. The final payload is a heavily obfuscated .NET framework implementing advanced anti-analysis techniques, credential harvesting, surveillance capabilities, and remote system control. Data exfiltration occurs via Discord webhooks and Telegram bots. The malware, identified as Pulsar RAT, features live chat functionality and background payload deployment, demonstrating a modern, high-evasion Windows malware operation designed for long-term access and large-scale data theft.
AI Analysis
Technical Summary
The Pulsar RAT malware campaign represents a modern, highly evasive Windows threat leveraging multiple advanced techniques to maintain stealth and persistence. The infection chain initiates with a concealed batch file that executes an embedded PowerShell loader. This loader then injects shellcode generated by the Donut tool into legitimate Windows processes, enabling in-memory execution that bypasses traditional disk-based detection mechanisms. The final payload is a heavily obfuscated .NET framework designed to resist reverse engineering and analysis through advanced anti-analysis techniques. Functionally, Pulsar RAT harvests credentials, conducts surveillance on the infected system, and provides remote system control to the attacker. Notably, it exfiltrates stolen data using Discord webhooks and Telegram bots, leveraging popular communication platforms to blend malicious traffic with legitimate network activity. The malware also features live chat capabilities, allowing attackers to interact in real-time with compromised hosts, and supports background payload deployment for ongoing operations. The use of living-off-the-land binaries and scripts (e.g., PowerShell) complicates detection, as these are legitimate system tools often whitelisted in enterprise environments. Although no known exploits are currently reported in the wild, the campaign’s sophisticated techniques and multi-stage infection chain make it a significant medium-level threat, particularly for organizations with Windows-based infrastructure and remote connectivity. The presence of multiple file hashes provides indicators of compromise for detection and response efforts.
Potential Impact
For European organizations, the Pulsar RAT campaign poses a substantial risk to confidentiality, integrity, and availability of critical systems and data. The malware’s credential harvesting capability can lead to unauthorized access to sensitive systems, enabling lateral movement and further compromise. Surveillance and remote control features threaten operational integrity and can facilitate espionage or sabotage. Data exfiltration through Discord and Telegram channels may bypass conventional network monitoring tools, increasing the risk of undetected data breaches. Organizations with remote workforces or those relying heavily on Windows environments are particularly vulnerable, as the malware exploits legitimate tools like PowerShell and process injection to evade detection. The long-term persistence and live chat functionality suggest attackers can maintain ongoing access, increasing the potential scale and duration of impact. This could lead to intellectual property theft, regulatory non-compliance (e.g., GDPR violations), financial losses, and reputational damage. The medium severity rating reflects the complexity and stealth of the malware, which may delay detection and remediation efforts.
Mitigation Recommendations
1. Implement advanced endpoint detection and response (EDR) solutions capable of monitoring and alerting on living-off-the-land techniques such as PowerShell execution, process injection, and in-memory shellcode execution. 2. Enforce strict PowerShell logging and enable script block logging to capture suspicious script activity. 3. Monitor network traffic for unusual or unauthorized connections to Discord webhooks and Telegram bot endpoints, and consider blocking or restricting these services at the network perimeter where appropriate. 4. Use application whitelisting to limit execution of unauthorized batch files and scripts, especially those launched from user directories or temporary locations. 5. Conduct regular credential audits and enforce multi-factor authentication (MFA) to reduce the impact of credential theft. 6. Employ behavioral analytics to detect anomalies such as live chat communications initiated by unknown processes. 7. Maintain updated threat intelligence feeds and integrate IoCs (hashes provided) into security tools for proactive detection. 8. Educate users on phishing and social engineering risks, as initial infection vectors often rely on user interaction. 9. Regularly patch and harden Windows systems to reduce attack surface, even though this malware uses living-off-the-land techniques. 10. Prepare incident response plans that include procedures for detecting and eradicating in-memory and obfuscated malware.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- hash: 0020b06dc2018cc2b5bf98945a39cbd3
- hash: 3abcad7678dd78832a164349aceeaa59
- hash: 648c0ba2bb1cde47fa8812f254821a72
- hash: 666493877fb7328c3e8c313fbcfdfd1e
- hash: 69392e0d2b877cb932ab709ebe758975
- hash: 0596efc427aebb99a4ec7f8d6a06f4777992fb08
- hash: dd5e51d3ea1d861d966d7e939d20befddd4620d3
- hash: 6aec480d0a66f008233875e99f4299d04a02ce755f812198c8bfc7d6d8ddf9d8
When Malware Talks Back
Description
A sophisticated multi-stage malware campaign employs living-off-the-land techniques and in-memory payload delivery to evade security controls. The infection chain begins with a hidden batch file that executes an embedded PowerShell loader, which then injects Donut-generated shellcode into legitimate Windows processes. The final payload is a heavily obfuscated .NET framework implementing advanced anti-analysis techniques, credential harvesting, surveillance capabilities, and remote system control. Data exfiltration occurs via Discord webhooks and Telegram bots. The malware, identified as Pulsar RAT, features live chat functionality and background payload deployment, demonstrating a modern, high-evasion Windows malware operation designed for long-term access and large-scale data theft.
AI-Powered Analysis
Technical Analysis
The Pulsar RAT malware campaign represents a modern, highly evasive Windows threat leveraging multiple advanced techniques to maintain stealth and persistence. The infection chain initiates with a concealed batch file that executes an embedded PowerShell loader. This loader then injects shellcode generated by the Donut tool into legitimate Windows processes, enabling in-memory execution that bypasses traditional disk-based detection mechanisms. The final payload is a heavily obfuscated .NET framework designed to resist reverse engineering and analysis through advanced anti-analysis techniques. Functionally, Pulsar RAT harvests credentials, conducts surveillance on the infected system, and provides remote system control to the attacker. Notably, it exfiltrates stolen data using Discord webhooks and Telegram bots, leveraging popular communication platforms to blend malicious traffic with legitimate network activity. The malware also features live chat capabilities, allowing attackers to interact in real-time with compromised hosts, and supports background payload deployment for ongoing operations. The use of living-off-the-land binaries and scripts (e.g., PowerShell) complicates detection, as these are legitimate system tools often whitelisted in enterprise environments. Although no known exploits are currently reported in the wild, the campaign’s sophisticated techniques and multi-stage infection chain make it a significant medium-level threat, particularly for organizations with Windows-based infrastructure and remote connectivity. The presence of multiple file hashes provides indicators of compromise for detection and response efforts.
Potential Impact
For European organizations, the Pulsar RAT campaign poses a substantial risk to confidentiality, integrity, and availability of critical systems and data. The malware’s credential harvesting capability can lead to unauthorized access to sensitive systems, enabling lateral movement and further compromise. Surveillance and remote control features threaten operational integrity and can facilitate espionage or sabotage. Data exfiltration through Discord and Telegram channels may bypass conventional network monitoring tools, increasing the risk of undetected data breaches. Organizations with remote workforces or those relying heavily on Windows environments are particularly vulnerable, as the malware exploits legitimate tools like PowerShell and process injection to evade detection. The long-term persistence and live chat functionality suggest attackers can maintain ongoing access, increasing the potential scale and duration of impact. This could lead to intellectual property theft, regulatory non-compliance (e.g., GDPR violations), financial losses, and reputational damage. The medium severity rating reflects the complexity and stealth of the malware, which may delay detection and remediation efforts.
Mitigation Recommendations
1. Implement advanced endpoint detection and response (EDR) solutions capable of monitoring and alerting on living-off-the-land techniques such as PowerShell execution, process injection, and in-memory shellcode execution. 2. Enforce strict PowerShell logging and enable script block logging to capture suspicious script activity. 3. Monitor network traffic for unusual or unauthorized connections to Discord webhooks and Telegram bot endpoints, and consider blocking or restricting these services at the network perimeter where appropriate. 4. Use application whitelisting to limit execution of unauthorized batch files and scripts, especially those launched from user directories or temporary locations. 5. Conduct regular credential audits and enforce multi-factor authentication (MFA) to reduce the impact of credential theft. 6. Employ behavioral analytics to detect anomalies such as live chat communications initiated by unknown processes. 7. Maintain updated threat intelligence feeds and integrate IoCs (hashes provided) into security tools for proactive detection. 8. Educate users on phishing and social engineering risks, as initial infection vectors often rely on user interaction. 9. Regularly patch and harden Windows systems to reduce attack surface, even though this malware uses living-off-the-land techniques. 10. Prepare incident response plans that include procedures for detecting and eradicating in-memory and obfuscated malware.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.pointwild.com/threat-intelligence/when-malware-talks-back"]
- Adversary
- null
- Pulse Id
- 697c7ba66b8f43dd7b4370c5
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash0020b06dc2018cc2b5bf98945a39cbd3 | — | |
hash3abcad7678dd78832a164349aceeaa59 | — | |
hash648c0ba2bb1cde47fa8812f254821a72 | — | |
hash666493877fb7328c3e8c313fbcfdfd1e | — | |
hash69392e0d2b877cb932ab709ebe758975 | — | |
hash0596efc427aebb99a4ec7f8d6a06f4777992fb08 | — | |
hashdd5e51d3ea1d861d966d7e939d20befddd4620d3 | — | |
hash6aec480d0a66f008233875e99f4299d04a02ce755f812198c8bfc7d6d8ddf9d8 | — |
Threat ID: 697ced97ac063202226a8793
Added to database: 1/30/2026, 5:42:47 PM
Last enriched: 1/30/2026, 5:57:08 PM
Last updated: 3/17/2026, 12:43:43 PM
Views: 106
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.