Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Pulsar RAT Attacking Windows Systems via Per-user Run Registry Key and Exfiltrates Sensitive Details

Posted on February 2, 2026February 2, 2026 By CWS

A brand new wave of assaults concentrating on Home windows programs has emerged by a classy distant entry trojan often called Pulsar RAT.

This malware establishes persistence utilizing the per-user Run registry key, enabling automated execution every time an contaminated person logs into their system.

The menace represents a harmful mixture of stealth, persistence, and knowledge theft capabilities designed to evade conventional safety controls.

The assault begins with an obfuscated batch file that quietly copies itself to a hidden folder inside the person’s AppData listing.

This file then registers itself within the Home windows registry below HKCUSoftwareMicrosoftWindowsCurrentVersionRun, guaranteeing the malware launches mechanically at startup with out requiring administrative privileges.

As soon as energetic, Pulsar RAT deploys a multi-stage an infection chain that extracts and executes embedded PowerShell loaders whereas minimizing disk artifacts that might alert safety programs.

Level Wild analysts recognized the malware working by living-off-the-land methods and in-memory payload supply strategies.

The PowerShell stage decrypts and injects Donut-generated shellcode straight into official Home windows processes like explorer.exe, using delayed execution and a watchdog mechanism to take care of resilient persistence.

Decryption of the shellcode reveals a closely obfuscated .NET payload implementing full-featured stealer and distant entry capabilities that focus on credentials, surveillance, and system management.

Assault Stream (Supply – Level Wild)

The malware demonstrates superior anti-analysis methods together with anti-virtualization, anti-debugging, and course of injection detection.

Stolen knowledge encompasses browser credentials, cryptocurrency wallets, VPN configurations, gaming platform accounts, and messaging software tokens.

All harvested info will get compressed into ZIP archives and exfiltrated over Discord webhooks and Telegram bots, with messages labeled “stealer by @aesxor” to assist attackers monitor contaminated victims.

Persistence and Evasion Mechanisms

Pulsar RAT ensures long-term entry by dual-layer persistence utilizing each Home windows Scheduled Duties and registry Run keys as fallback.

The malware creates a scheduled activity configured to run at person logon with highest accessible privileges, whereas concurrently writing the executable path below the present person Run key.

This redundancy ensures execution survives even in restricted environments the place one persistence methodology is perhaps blocked or monitored.

Persistence by way of run key (Supply – Level Wild)

Detection efforts face important challenges as a result of malware’s steady background monitoring threads that look ahead to debuggers, digital machines, and injection makes an attempt.

When evaluation instruments like x64dbg, WinDbg, dnSpy, or IDA are detected by window enumeration or API checks, the malware instantly terminates itself to keep away from examination.

This self-protection extends to {hardware} breakpoint detection, PEB debugging flags, and deal with manipulation methods that collectively kind a complete anti-analysis framework designed to withstand reverse engineering.

Organizations ought to implement behavioral detection programs able to figuring out in-memory shellcode injection, monitor registry Run key modifications, and scrutinize uncommon PowerShell execution patterns.

Community monitoring for connections to recognized command-and-control servers at 185.132.53.17:7800 and blocking Discord/Telegram exfiltration channels may assist include energetic infections.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attacking, Details, Exfiltrates, Key, Pulsar, RAT, Registry, Run, Sensitive, Systems, viaPeruser, Windows

Post navigation

Previous Post: Open VSX Publisher Account Hijacked in Fresh GlassWorm Attack
Next Post: 21,000+ OpenClaw AI Instances With Personal Configurations Exposed Online

Related Posts

Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities Cyber Security News
Microsoft Teams Introduces Automatic Alerts for Malicious Links from Attackers Cyber Security News
Wing FTP Server Vulnerability Actively Exploited Cyber Security News
Chrome “WebView” Vulnerability Allows Hackers to Bypass Security Restrictions Cyber Security News
Cisco IOS 0-Day RCE Vulnerability Actively Exploited in the Wild Cyber Security News
AMD Zen 5 Processors RDSEED Vulnerability Breaks Integrity With Randomness Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
  • ShinyHunters-Branded Extortion Activity Expands, Escalates
  • New Punishing Owl Hacker Group Targeting Networks of Russian Government Security Agency
  • 21,000+ OpenClaw AI Instances With Personal Configurations Exposed Online

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
  • ShinyHunters-Branded Extortion Activity Expands, Escalates
  • New Punishing Owl Hacker Group Targeting Networks of Russian Government Security Agency
  • 21,000+ OpenClaw AI Instances With Personal Configurations Exposed Online

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark