Security researchers at Point Wild have identified a new and sophisticated malware campaign distributing a .NET-based Remote Access Trojan (RAT) named Pulsar RAT. This malware is engineered for stealth, primarily targeting Windows environments. Its key characteristics include a multi-stage, memory-resident infection process that minimizes disk artifacts, making it difficult for traditional file-based antivirus solutions to detect. The RAT also employs advanced anti-analysis features to thwart researchers and automated sandboxes. The ultimate goal of Pulsar RAT is to provide attackers with interactive remote control over compromised systems to facilitate credential theft, surveillance, and data exfiltration. The use of legitimate web services like Discord and Telegram for command and control further complicates detection efforts.
Pulsar RAT represents an evolution in stealthy malware, combining several effective evasion techniques. The infection process is multi-staged, meaning the initial payload is likely a small dropper or loader that then fetches and executes the main RAT component directly in memory. This fileless or near-fileless approach is a hallmark of modern malware seeking to bypass signature-based detection. The malware's reliance on standard Windows components for its operations, a practice known as "living-off-the-land" (LoTL), helps it blend in with normal system activity. The interactive nature of the RAT suggests it is not a simple automated tool but is used by human operators for hands-on-keyboard activity post-compromise.
Pulsar RAT is a modular implant with a strong focus on evasion and interactive control.
T1027 - Obfuscated Files or Information.T1497.001 - System Checks).T1622 - Debugger Evasion).T1102 - Web Service. It specifically uses Discord webhooks and Telegram bots to receive commands and exfiltrate stolen data.T1003 - OS Credential Dumping).T1059.003 - Windows Command Shell).T1560.001 - Archive via Utility).The deployment of a sophisticated RAT like Pulsar RAT on a corporate network can lead to a complete compromise. The stealthy nature of the malware means it can remain undetected for long periods, allowing attackers ample time to map the network, escalate privileges, and locate and exfiltrate high-value data. The interactive control allows attackers to adapt their tactics in real-time based on the environment they have compromised. A successful infection could result in major data breaches, theft of intellectual property, and compromise of employee and customer credentials.
| Type | Value | Description |
|---|---|---|
network_traffic_pattern |
Outbound HTTPS to discord.com/api/webhooks/... |
Traffic to Discord webhook URLs from processes other than the Discord client itself. |
network_traffic_pattern |
Outbound HTTPS to api.telegram.org/bot<token>/... |
Traffic to the Telegram Bot API from non-browser processes. |
process_name |
rundll32.exe, regsvr32.exe |
Monitor for these legitimate processes making suspicious outbound network connections, as they are often used to load in-memory payloads. |
command_line_pattern |
powershell -enc <base64_string> |
Use of encoded PowerShell commands is a common technique for fileless malware execution. |
D3-OTF).M1047 - Audit).M1038 - Execution Prevention).M1030 - Network Segmentation).M1017 - User Training).Implement egress filtering to block outbound connections to unauthorized web services like Discord and Telegram from servers and workstations.
Mapped D3FEND Techniques:
Use EDR and behavioral analytics to detect anomalous activities, such as legitimate processes making suspicious network connections.
Mapped D3FEND Techniques:
Use application control to prevent the execution of unauthorized .NET assemblies and scripts.
Mapped D3FEND Techniques:
To counter Pulsar RAT's C2 mechanism, implement strict outbound traffic filtering at the network perimeter. Since the RAT uses legitimate services like Discord and Telegram, simply blocking IPs is insufficient. Instead, use a next-generation firewall or secure web gateway with application-layer inspection (L7) to create policies that deny access to these services for all systems except those with a clear business need. For example, all servers and most corporate workstations should be blocked from accessing discord.com and api.telegram.org. This filtering breaks the malware's C2 channel, preventing operators from controlling the implant and exfiltrating data. It effectively isolates the compromised host, rendering the RAT useless and providing a clear signal for incident responders to investigate the blocked connection attempts.
Deploy an EDR solution capable of advanced Process Analysis and memory inspection to detect Pulsar RAT's in-memory execution and LoTL behavior. Configure the EDR to monitor for suspicious process relationships, such as rundll32.exe or a legitimate Office application spawning a .NET process that makes outbound network connections. Since the RAT is memory-resident, the EDR's ability to scan process memory for anomalous code or strings is crucial for detection. Furthermore, instrument the EDR to alert on the RAT's specific anti-analysis techniques, such as API calls used to detect VMs or debuggers. This behavioral approach is essential for catching fileless threats that traditional signature-based AV would miss.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats