New "Pulsar RAT" Evades Detection with In-Memory Execution and LoTL Techniques

Stealthy 'Pulsar RAT' Windows Malware Campaign Uses In-Memory Execution for Evasion

MEDIUM
February 2, 2026
4m read
MalwareThreat Intelligence

Related Entities

Organizations

Point Wild

Products & Tech

Other

Pulsar RAT

Full Report

Executive Summary

Security researchers at Point Wild have identified a new and sophisticated malware campaign distributing a .NET-based Remote Access Trojan (RAT) named Pulsar RAT. This malware is engineered for stealth, primarily targeting Windows environments. Its key characteristics include a multi-stage, memory-resident infection process that minimizes disk artifacts, making it difficult for traditional file-based antivirus solutions to detect. The RAT also employs advanced anti-analysis features to thwart researchers and automated sandboxes. The ultimate goal of Pulsar RAT is to provide attackers with interactive remote control over compromised systems to facilitate credential theft, surveillance, and data exfiltration. The use of legitimate web services like Discord and Telegram for command and control further complicates detection efforts.

Threat Overview

Pulsar RAT represents an evolution in stealthy malware, combining several effective evasion techniques. The infection process is multi-staged, meaning the initial payload is likely a small dropper or loader that then fetches and executes the main RAT component directly in memory. This fileless or near-fileless approach is a hallmark of modern malware seeking to bypass signature-based detection. The malware's reliance on standard Windows components for its operations, a practice known as "living-off-the-land" (LoTL), helps it blend in with normal system activity. The interactive nature of the RAT suggests it is not a simple automated tool but is used by human operators for hands-on-keyboard activity post-compromise.

Technical Analysis

Pulsar RAT is a modular implant with a strong focus on evasion and interactive control.

  • Framework: The RAT is built on the .NET framework, which can sometimes be more difficult to analyze than native code.
  • Execution: Its primary execution method is in-memory, avoiding writing the main payload to disk. This is a form of T1027 - Obfuscated Files or Information.
  • Defense Evasion: The malware incorporates several anti-analysis techniques:
    • Anti-VM: Checks to see if it is running inside a virtual machine (T1497.001 - System Checks).
    • Anti-Debugging: Detects if a debugger is attached to its process (T1622 - Debugger Evasion).
    • Process Injection Detection: Checks for signs of process injection.
  • Command and Control (C2): The RAT abuses legitimate, high-reputation web services for C2 communications, a technique known as T1102 - Web Service. It specifically uses Discord webhooks and Telegram bots to receive commands and exfiltrate stolen data.
  • Capabilities: Once active, it provides operators with a range of functions, including:
  • Data Exfiltration: Stolen data is compressed into ZIP archives and exfiltrated over the C2 channel (T1560.001 - Archive via Utility).

Impact Assessment

The deployment of a sophisticated RAT like Pulsar RAT on a corporate network can lead to a complete compromise. The stealthy nature of the malware means it can remain undetected for long periods, allowing attackers ample time to map the network, escalate privileges, and locate and exfiltrate high-value data. The interactive control allows attackers to adapt their tactics in real-time based on the environment they have compromised. A successful infection could result in major data breaches, theft of intellectual property, and compromise of employee and customer credentials.

Cyber Observables for Detection

Type Value Description
network_traffic_pattern Outbound HTTPS to discord.com/api/webhooks/... Traffic to Discord webhook URLs from processes other than the Discord client itself.
network_traffic_pattern Outbound HTTPS to api.telegram.org/bot<token>/... Traffic to the Telegram Bot API from non-browser processes.
process_name rundll32.exe, regsvr32.exe Monitor for these legitimate processes making suspicious outbound network connections, as they are often used to load in-memory payloads.
command_line_pattern powershell -enc <base64_string> Use of encoded PowerShell commands is a common technique for fileless malware execution.

Detection & Response

  1. Egress Traffic Filtering: Strictly filter and monitor outbound network traffic. Deny all outbound connections to known anonymization services and social media platforms like Discord and Telegram from servers and non-essential workstations (D3-OTF).
  2. Memory Analysis: Since Pulsar RAT is memory-resident, traditional file scanning is ineffective. Use EDR tools with memory scanning capabilities or conduct periodic memory forensics on critical systems to identify suspicious in-memory artifacts.
  3. PowerShell Logging: Enable enhanced PowerShell logging (Module Logging, Script Block Logging) to capture the activity of LoTL scripts. This can reveal the deobfuscated commands used by the malware (M1047 - Audit).
  4. Behavioral Analytics: Use User and Entity Behavior Analytics (UEBA) to detect anomalous patterns, such as a user's machine suddenly communicating with Discord for the first time, or a server process attempting to create a ZIP archive.

Mitigation

  1. Application Control: Implement application control technologies, such as Windows Defender Application Control, to restrict the execution of unauthorized scripts and .NET assemblies (M1038 - Execution Prevention).
  2. Endpoint Hardening: Harden endpoints by disabling or restricting PowerShell for standard users and implementing Attack Surface Reduction (ASR) rules to block common malware behaviors.
  3. Network Segmentation: Segment the network to prevent lateral movement. Even if a workstation is compromised, segmentation can prevent the RAT from reaching critical servers or other sensitive parts of the network (M1030 - Network Segmentation).
  4. User Training: Educate users about phishing, the primary initial access vector for many RATs. Train them to be suspicious of unsolicited attachments and links (M1017 - User Training).

Timeline of Events

1
February 2, 2026
This article was published

MITRE ATT&CK Mitigations

Implement egress filtering to block outbound connections to unauthorized web services like Discord and Telegram from servers and workstations.

Mapped D3FEND Techniques:

Use EDR and behavioral analytics to detect anomalous activities, such as legitimate processes making suspicious network connections.

Mapped D3FEND Techniques:

Use application control to prevent the execution of unauthorized .NET assemblies and scripts.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To counter Pulsar RAT's C2 mechanism, implement strict outbound traffic filtering at the network perimeter. Since the RAT uses legitimate services like Discord and Telegram, simply blocking IPs is insufficient. Instead, use a next-generation firewall or secure web gateway with application-layer inspection (L7) to create policies that deny access to these services for all systems except those with a clear business need. For example, all servers and most corporate workstations should be blocked from accessing discord.com and api.telegram.org. This filtering breaks the malware's C2 channel, preventing operators from controlling the implant and exfiltrating data. It effectively isolates the compromised host, rendering the RAT useless and providing a clear signal for incident responders to investigate the blocked connection attempts.

Deploy an EDR solution capable of advanced Process Analysis and memory inspection to detect Pulsar RAT's in-memory execution and LoTL behavior. Configure the EDR to monitor for suspicious process relationships, such as rundll32.exe or a legitimate Office application spawning a .NET process that makes outbound network connections. Since the RAT is memory-resident, the EDR's ability to scan process memory for anomalous code or strings is crucial for detection. Furthermore, instrument the EDR to alert on the RAT's specific anti-analysis techniques, such as API calls used to detect VMs or debuggers. This behavioral approach is essential for catching fileless threats that traditional signature-based AV would miss.

Sources & References

2nd February – Threat Intelligence Report
Check Point Research (research.checkpoint.com) February 2, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

RATmalware.NETin-memoryliving-off-the-landDiscordTelegram

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading