PULSE NAME
CastleRAT attack first to abuse Deno JavaScript runtime to evade enterprise security
WHITE AlienVault 2026-03-11 Modified: 2026-04-10
6
IOCs
LOW VOLUME
A sophisticated infection chain has been discovered that installs CastleRAT malware without leaving traces on disk. The attack uniquely abuses the Deno runtime as a malicious framework, combining social engineering, steganography, and in-memory execution to evade detection. The process involves tricking users into executing a command, installing Deno, running obfuscated JavaScript, and decoding a payload hidden in a JPEG image. CastleRAT then gains total control, performing host fingerprinting, keylogging, clipboard hijacking, digital identity theft, and audio/video surveillance. This campaign demonstrates the evolution of malware towards invisibility and the need for advanced endpoint behavioral monitoring to detect such threats.
Indicators of Compromise (6)
All FileHash-MD5 FileHash-SHA1 FileHash-SHA256 domain hostname
TYPEINDICATORDESCRIPTIONCREATED
FileHash-MD5 ca37e31d651bbd5bbddef3ea716b8b4f 2026-03-11
FileHash-SHA1 de9707a8505683930fccf5536e311242425d420a 2026-03-11
FileHash-SHA256 a4787a42070994b7f1222025828faf9b153710bb730e58da710728e148282e28 2026-03-11
FileHash-SHA256 bd8203ab88983bc081545ff325f39e9c5cd5eb6a99d04ae2a6cf862535c9829a 2026-03-11
domain serialmenot.com 2026-03-11
hostname dsennbuappec.zhivachkapro.com 2026-03-11