← Back to Pulse Feed
PULSE DETAIL
PULSE NAME
CastleRAT attack first to abuse Deno JavaScript runtime to evade enterprise security
A sophisticated infection chain has been discovered that installs CastleRAT malware without leaving traces on disk. The attack uniquely abuses the Deno runtime as a malicious framework, combining social engineering, steganography, and in-memory execution to evade detection. The process involves tricking users into executing a command, installing Deno, running obfuscated JavaScript, and decoding a payload hidden in a JPEG image. CastleRAT then gains total control, performing host fingerprinting, keylogging, clipboard hijacking, digital identity theft, and audio/video surveillance. This campaign demonstrates the evolution of malware towards invisibility and the need for advanced endpoint behavioral monitoring to detect such threats.
MITRE ATT&CK & Malware Families
Indicators of Compromise (6)
| TYPE | INDICATOR | DESCRIPTION | CREATED | |
|---|---|---|---|---|
| FileHash-MD5 | ca37e31d651bbd5bbddef3ea716b8b4f | — | 2026-03-11 | |
| FileHash-SHA1 | de9707a8505683930fccf5536e311242425d420a | — | 2026-03-11 | |
| FileHash-SHA256 | a4787a42070994b7f1222025828faf9b153710bb730e58da710728e148282e28 | — | 2026-03-11 | |
| FileHash-SHA256 | bd8203ab88983bc081545ff325f39e9c5cd5eb6a99d04ae2a6cf862535c9829a | — | 2026-03-11 | |
| domain | serialmenot.com | — | 2026-03-11 | |
| hostname | dsennbuappec.zhivachkapro.com | — | 2026-03-11 |