Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

When Malware Talks Back

0
Medium
Published: Fri Jan 30 2026 (01/30/2026, 09:36:38 UTC)
Source: AlienVault OTX General

Description

Pulsar RAT is a sophisticated multi-stage Windows malware campaign that uses living-off-the-land techniques and in-memory payload execution to evade detection. It begins with a hidden batch file that launches an embedded PowerShell loader, which injects shellcode into legitimate Windows processes using Donut technology. The final payload is a heavily obfuscated . NET framework that employs advanced anti-analysis methods, credential harvesting, surveillance, and remote control capabilities. Data exfiltration is conducted via Discord webhooks and Telegram bots, enabling stealthy communication and data theft. The malware supports live chat functionality and background payload deployment, indicating a focus on long-term persistence and large-scale data theft. It does not currently have known exploits in the wild but poses a medium severity threat due to its complexity and stealth. European organizations using Windows environments are at risk, especially those with high-value data and remote workforce setups. Mitigation requires targeted detection of living-off-the-land behaviors, monitoring of PowerShell and process injection activities, and blocking suspicious Discord and Telegram network traffic.

AI-Powered Analysis

AILast updated: 01/30/2026, 17:57:08 UTC

Technical Analysis

The Pulsar RAT malware campaign represents a modern, highly evasive Windows threat leveraging multiple advanced techniques to maintain stealth and persistence. The infection chain initiates with a concealed batch file that executes an embedded PowerShell loader. This loader then injects shellcode generated by the Donut tool into legitimate Windows processes, enabling in-memory execution that bypasses traditional disk-based detection mechanisms. The final payload is a heavily obfuscated .NET framework designed to resist reverse engineering and analysis through advanced anti-analysis techniques. Functionally, Pulsar RAT harvests credentials, conducts surveillance on the infected system, and provides remote system control to the attacker. Notably, it exfiltrates stolen data using Discord webhooks and Telegram bots, leveraging popular communication platforms to blend malicious traffic with legitimate network activity. The malware also features live chat capabilities, allowing attackers to interact in real-time with compromised hosts, and supports background payload deployment for ongoing operations. The use of living-off-the-land binaries and scripts (e.g., PowerShell) complicates detection, as these are legitimate system tools often whitelisted in enterprise environments. Although no known exploits are currently reported in the wild, the campaign’s sophisticated techniques and multi-stage infection chain make it a significant medium-level threat, particularly for organizations with Windows-based infrastructure and remote connectivity. The presence of multiple file hashes provides indicators of compromise for detection and response efforts.

Potential Impact

For European organizations, the Pulsar RAT campaign poses a substantial risk to confidentiality, integrity, and availability of critical systems and data. The malware’s credential harvesting capability can lead to unauthorized access to sensitive systems, enabling lateral movement and further compromise. Surveillance and remote control features threaten operational integrity and can facilitate espionage or sabotage. Data exfiltration through Discord and Telegram channels may bypass conventional network monitoring tools, increasing the risk of undetected data breaches. Organizations with remote workforces or those relying heavily on Windows environments are particularly vulnerable, as the malware exploits legitimate tools like PowerShell and process injection to evade detection. The long-term persistence and live chat functionality suggest attackers can maintain ongoing access, increasing the potential scale and duration of impact. This could lead to intellectual property theft, regulatory non-compliance (e.g., GDPR violations), financial losses, and reputational damage. The medium severity rating reflects the complexity and stealth of the malware, which may delay detection and remediation efforts.

Mitigation Recommendations

1. Implement advanced endpoint detection and response (EDR) solutions capable of monitoring and alerting on living-off-the-land techniques such as PowerShell execution, process injection, and in-memory shellcode execution. 2. Enforce strict PowerShell logging and enable script block logging to capture suspicious script activity. 3. Monitor network traffic for unusual or unauthorized connections to Discord webhooks and Telegram bot endpoints, and consider blocking or restricting these services at the network perimeter where appropriate. 4. Use application whitelisting to limit execution of unauthorized batch files and scripts, especially those launched from user directories or temporary locations. 5. Conduct regular credential audits and enforce multi-factor authentication (MFA) to reduce the impact of credential theft. 6. Employ behavioral analytics to detect anomalies such as live chat communications initiated by unknown processes. 7. Maintain updated threat intelligence feeds and integrate IoCs (hashes provided) into security tools for proactive detection. 8. Educate users on phishing and social engineering risks, as initial infection vectors often rely on user interaction. 9. Regularly patch and harden Windows systems to reduce attack surface, even though this malware uses living-off-the-land techniques. 10. Prepare incident response plans that include procedures for detecting and eradicating in-memory and obfuscated malware.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.pointwild.com/threat-intelligence/when-malware-talks-back"]
Adversary
null
Pulse Id
697c7ba66b8f43dd7b4370c5
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash0020b06dc2018cc2b5bf98945a39cbd3
hash3abcad7678dd78832a164349aceeaa59
hash648c0ba2bb1cde47fa8812f254821a72
hash666493877fb7328c3e8c313fbcfdfd1e
hash69392e0d2b877cb932ab709ebe758975
hash0596efc427aebb99a4ec7f8d6a06f4777992fb08
hashdd5e51d3ea1d861d966d7e939d20befddd4620d3
hash6aec480d0a66f008233875e99f4299d04a02ce755f812198c8bfc7d6d8ddf9d8

Threat ID: 697ced97ac063202226a8793

Added to database: 1/30/2026, 5:42:47 PM

Last enriched: 1/30/2026, 5:57:08 PM

Last updated: 1/31/2026, 5:51:20 AM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats