Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Pulsar RAT Attacking Windows Systems via Per-user Run Registry Key and Exfiltrates Sensitive Details

Posted on February 2, 2026February 2, 2026 By CWS

A brand new wave of assaults concentrating on Home windows programs has emerged by a classy distant entry trojan often called Pulsar RAT.

This malware establishes persistence utilizing the per-user Run registry key, enabling automated execution every time an contaminated person logs into their system.

The menace represents a harmful mixture of stealth, persistence, and knowledge theft capabilities designed to evade conventional safety controls.

The assault begins with an obfuscated batch file that quietly copies itself to a hidden folder inside the person’s AppData listing.

This file then registers itself within the Home windows registry below HKCUSoftwareMicrosoftWindowsCurrentVersionRun, guaranteeing the malware launches mechanically at startup with out requiring administrative privileges.

As soon as energetic, Pulsar RAT deploys a multi-stage an infection chain that extracts and executes embedded PowerShell loaders whereas minimizing disk artifacts that might alert safety programs.

Level Wild analysts recognized the malware working by living-off-the-land methods and in-memory payload supply strategies.

The PowerShell stage decrypts and injects Donut-generated shellcode straight into official Home windows processes like explorer.exe, using delayed execution and a watchdog mechanism to take care of resilient persistence.

Decryption of the shellcode reveals a closely obfuscated .NET payload implementing full-featured stealer and distant entry capabilities that focus on credentials, surveillance, and system management.

Assault Stream (Supply – Level Wild)

The malware demonstrates superior anti-analysis methods together with anti-virtualization, anti-debugging, and course of injection detection.

Stolen knowledge encompasses browser credentials, cryptocurrency wallets, VPN configurations, gaming platform accounts, and messaging software tokens.

All harvested info will get compressed into ZIP archives and exfiltrated over Discord webhooks and Telegram bots, with messages labeled “stealer by @aesxor” to assist attackers monitor contaminated victims.

Persistence and Evasion Mechanisms

Pulsar RAT ensures long-term entry by dual-layer persistence utilizing each Home windows Scheduled Duties and registry Run keys as fallback.

The malware creates a scheduled activity configured to run at person logon with highest accessible privileges, whereas concurrently writing the executable path below the present person Run key.

This redundancy ensures execution survives even in restricted environments the place one persistence methodology is perhaps blocked or monitored.

Persistence by way of run key (Supply – Level Wild)

Detection efforts face important challenges as a result of malware’s steady background monitoring threads that look ahead to debuggers, digital machines, and injection makes an attempt.

When evaluation instruments like x64dbg, WinDbg, dnSpy, or IDA are detected by window enumeration or API checks, the malware instantly terminates itself to keep away from examination.

This self-protection extends to {hardware} breakpoint detection, PEB debugging flags, and deal with manipulation methods that collectively kind a complete anti-analysis framework designed to withstand reverse engineering.

Organizations ought to implement behavioral detection programs able to figuring out in-memory shellcode injection, monitor registry Run key modifications, and scrutinize uncommon PowerShell execution patterns.

Community monitoring for connections to recognized command-and-control servers at 185.132.53.17:7800 and blocking Discord/Telegram exfiltration channels may assist include energetic infections.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attacking, Details, Exfiltrates, Key, Pulsar, RAT, Registry, Run, Sensitive, Systems, viaPeruser, Windows

Post navigation

Previous Post: Open VSX Publisher Account Hijacked in Fresh GlassWorm Attack
Next Post: ShinyHunters-Branded Extortion Activity Expands, Escalates

Related Posts

New North Korean IT Worker With Innocent Job Application Get Access to Organization’s Network Cyber Security News
DragonForce Ransomware Group – The Rise of a Relentless Cyber Threat in 2025 Cyber Security News
Google Chrome 0-Day Vulnerability Exploited in the Wild Cyber Security News
Operation DupeHike Attacking Employees Using Weaponized Documents DUPERUNNER Malware Cyber Security News
Hackers Allegedly Selling WinRAR 0-day Exploit on Dark Web Forums for $80,000 Cyber Security News
Coyote Malware Abuses Microsoft’s UI Automation in Wild to Exfiltrate Login Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ShinyHunters-Branded Extortion Activity Expands, Escalates
  • Pulsar RAT Attacking Windows Systems via Per-user Run Registry Key and Exfiltrates Sensitive Details
  • Open VSX Publisher Account Hijacked in Fresh GlassWorm Attack
  • Hackers Exploiting Microsoft Office 0-day Vulnerability to Deploy Malware
  • Default ICS Credentials Exploited in Destructive Attack on Polish Energy Facilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ShinyHunters-Branded Extortion Activity Expands, Escalates
  • Pulsar RAT Attacking Windows Systems via Per-user Run Registry Key and Exfiltrates Sensitive Details
  • Open VSX Publisher Account Hijacked in Fresh GlassWorm Attack
  • Hackers Exploiting Microsoft Office 0-day Vulnerability to Deploy Malware
  • Default ICS Credentials Exploited in Destructive Attack on Polish Energy Facilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark