Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

CastleLoader

162
Global rank
112 infographic chevron month
Month rank
108 infographic chevron week
Week rank
0
IOCs

CastleLoader is a modern malware loader designed to quietly establish initial access and deliver follow-up payloads such as stealers, RATs, and ransomware. It focuses on stealth, flexibility, and rapid payload rotation, making it an effective tool for financially motivated threat actors and a persistent problem for enterprise defenders.

Loader
Type
Unknown
Origin
1 February, 2025
First seen
3 February, 2026
Last seen

How to analyze CastleLoader with ANY.RUN

Type
Unknown
Origin
1 February, 2025
First seen
3 February, 2026
Last seen

IOCs

IP addresses
195.201.108.189
180.178.189.17
102.135.95.102
94.159.113.32
45.134.26.41
185.39.19.181
45.11.183.165
192.124.178.74
195.211.97.51
178.17.57.103
168.100.8.84
80.64.18.245
5.178.1.8
64.52.80.121
109.104.153.29
192.109.138.102
67.217.228.198
185.156.248.24
147.45.177.127
185.39.19.180
Domains
update-reques898665.com
info-guest44567645.com
blkiesf.com
request44456776.com
boiksal.com
request345553.com
kakapupuneww.com
autryjones.com
update-info539156.com
update-gues3429.com
guest-request44565494.com
request-info3444.com
gabesworld.com
guest-request666543.com
bioskbd.com
guest-request677653.com
albafood.shop
treetankists.com
justnewdmain.com
galaxioflow.com
Last Seen at

Recent blog posts

post image
Release Notes: Workflow Improvements, MISP In...
watchers 889
comments 0
post image
Enterprise Phishing: How Attackers Abuse Trus...
watchers 2196
comments 0
post image
SOC & Business Success with ANY.RUN: Real...
watchers 2941
comments 0

CastleLoader: The Quiet Malware That Opens the Door to Bigger Attacks

Key Takeaways

  1. CastleLoader is a Sophisticated MaaS Operation; it serves multiple threat actor clusters, delivering diverse secondary payloads including information stealers and RATs with a documented 28.7% infection success rate.
  1. Multi-Industry Targeting with Sector-Specific Campaigns: documented campaigns show focused attacks on logistics, hospitality, government entities, and software developers through industry-specific social engineering.
  1. ClickFix and Fake Repositories Are Primary Infection Vectors.
  1. Advanced Evasion Through Multi-Stage Execution: CastleLoader employs a three-stage architecture (stager/downloader, loader, core backdoor) with anti-VM detection, in-memory execution, PEB walking, and process hollowing.
  1. ANY.RUN’s Threat Intelligence Lookup helps SOCs quickly understand campaign scope and relationships.

threatName:"castleloader".

CastleLoader overview in TI Lookup CastleLoader overview in TI Lookup: targeted industries and countries; IOCs; samples

  1. ANY.RUN’s Interactive Sandbox allows defenders to safely observe CastleLoader behavior and extract actionable indicators in real time.

View analysis

CastleLoader malware analysis in Interactive Sandbox CastleLoader malware analysis

What is CastleLoader Malware?

Developed and operated by the threat actor tracked as GrayBravo (formerly TAG-150), this loader combines advanced evasion techniques with a robust delivery infrastructure that enables multiple threat actors to leverage it for their campaigns.

The malware's architecture consists of multiple components working in concert. At its core, CastleLoader employs a three-stage execution chain: a shellcode stager/downloader, a loader component, and a core backdoor module. This modular design allows threat actors to separate the initial infection vector from eventual malware behavior, significantly complicating attribution efforts and enabling rapid adaptation to defensive measures.

CastleLoader utilizes sophisticated anti-analysis mechanisms including dead code injection, runtime packing, and virtual machine detection capabilities. The malware can escalate privileges to run with administrator rights and displays decoy messages such as fake system warnings to mask its true purpose. Once deployed, it establishes communication with command-and-control (C2) servers to retrieve and execute next-stage payloads, all while maintaining a low detection profile through in-memory execution techniques.

Recent variants have evolved to include Python-based loaders that leverage windowless interpreters (pythonw.exe) to rebuild and launch CastleLoader directly in memory, avoiding disk-based detection. The malware employs PEB (Process Environment Block) Walking to resolve required APIs at runtime, further enhancing its ability to bypass traditional security controls.

What makes CastleLoader notable is its operational discipline. Payloads are often updated, infrastructure is frequently rotated, and delivery techniques evolve quickly. This reduces the effectiveness of static indicators and signature-based defenses, forcing defenders to rely on behavioral analysis and threat intelligence correlation.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

How CastleLoader threatens businesses and organizations

For organizations, CastleLoader is dangerous precisely because it is not the final threat, but the opening act.

Key business risks include:

  • Initial access for larger attacks: CastleLoader is often the first step toward ransomware deployment or long-term espionage.
  • Credential theft and lateral movement: Follow-up payloads frequently target browsers, email clients, VPNs, and internal authentication mechanisms.
  • Data breaches and compliance exposure: Stolen credentials and data can lead to regulatory violations, fines, and reputational damage.
  • Operational disruption: Once access is established, attackers can deploy tools that disrupt business operations at a chosen moment.
  • High dwell time: Because loaders aim to stay unnoticed, attackers may remain inside networks for weeks before triggering visible damage.

In short, CastleLoader turns a single user mistake into a multi-stage business incident.

Victimology: vulnerable industries and sectors

CastleLoader demonstrates broad targeting capabilities with specific threat clusters focusing on particular industries:

  • Logistics and Transportation: The most extensively documented campaign (tracked as TAG-160) specifically targets the logistics sector through sophisticated phishing operations. Threat actors impersonate legitimate logistics firms and exploit freight-matching platforms like DAT Freight & Analytics and Loadlink Technologies.

  • Government Entities: The sensitive nature of governmental data and the potential for espionage make these entities particularly attractive targets for threat actors.

  • Hospitality Industry: Campaign clusters have leveraged Booking.com-themed phishing attacks, indicating focused targeting of hospitality sector organizations and their customers. These campaigns exploit the industry's reliance on online booking systems and customer communications.

  • Technology and Software Development through fake GitHub repositories mimicking legitimate development tools like SQL Server Management Studio (SSMS), RVTools, and Zabbix.

  • Healthcare facilities have been affected by secondary payloads delivered via CastleLoader, particularly ransomware variants that cause operational disruptions.

  • Financial Services: Any organization handling financial transactions, payment processing, or banking operations faces elevated risk due to the information-stealing capabilities of CastleLoader's secondary payloads.

  • Small and Medium Enterprises (SMEs): Companies with limited security resources are particularly vulnerable to CastleLoader's social engineering tactics, as they may lack robust security awareness training and advanced detection capabilities.

The geographical targeting shows strong focus on North American organizations, particularly in the United States, though the infrastructure and MaaS model enable global operations.

How Can Businesses Proactively Protect Against CastleLoader

ANY.RUN’s Threat Intelligence Feeds deliver real-time, actionable IOCs (domains, URLs, IPs) derived from sandbox detonations and global submissions. For CastleLoader, feeds supply emerging C2s, loader variants, and linked payloads (e.g., CastleRAT), enabling automated blocking in firewalls, EDR, SIEMs. This helps organizations stay ahead of evolving MaaS campaigns, minimize dwell time, and prevent chain infections — critical for high-velocity threats like loaders.

Business Impact:

  • Reduced Mean Time to Detect (MTTD): Automated indicator ingestion identifies CastleLoader activity within minutes rather than hours or days

  • Prevention of Initial Compromise: Blocking C2 infrastructure and malicious domains prevents CastleLoader from establishing footholds

  • Operational Continuity: Early detection and automated blocking minimize disruption to business operations

  • Improved Security ROI: Leveraging threat intelligence from 15,000+ organizations maximizes detection capabilities without corresponding cost increases.

TI Feeds benefits and integration TI Feeds benefits and integration options

Infection Vectors and Propagation Methods

The primary infection vector utilizes the ClickFix technique, where victims encounter fraudulent web pages themed around Cloudflare services, software development libraries, online meeting platforms (like Google Meet), or browser update notifications.

These pages display fake error messages, CAPTCHA verification prompts, or security warnings that instruct users to copy and execute malicious PowerShell commands via the Windows Run dialog (Win+R).

CastleLoader operators also create convincing fake GitHub repositories under the names of legitimate applications. For example, repositories named "ssms-lib" (impersonating SQL Server Management Studio) and "zscaler-dir/Zscaler-Client-Connector" have been used to distribute trojanized installers.

Threat actors employ search engine optimization techniques to ensure malicious download pages rank higher than legitimate software distributors in search results. Finally, traditional phishing remains part of the infection chain, particularly in logistics sector targeting.

Propagation Mechanism

Once initial infection occurs via PowerShell script execution, CastleLoader uses built-in Windows utilities (curl.exe, tar.exe) to download and stage payloads in hidden AppData folders. The malware then establishes C2 communication to retrieve additional modules and secondary payloads based on the victim's value and environment. This staged approach allows operators to deploy targeted malware to high-value victims while maintaining flexibility in payload selection.

How CastleLoader functions

CastleLoader operates through a sophisticated multi-stage execution chain:

Stage 1: Initial Delivery and Execution

The infection begins with a packed executable, often delivered via Inno Setup installers containing AutoIT scripts. When executed, the malware unpacks itself at runtime, employing dead code injection to hinder static analysis. Recent variants use Python bytecode executed via pythonw[.]exe to avoid console windows and disk-based detection.

Stage 2: Shellcode Stager/Downloader

The initial stage deploys a shellcode stager that performs environment checks to detect virtual machines, sandboxes, and analysis tools. If running in a legitimate environment, it proceeds to establish initial C2 communication. The stager uses process hollowing techniques to inject code into legitimate Windows processes, masking malicious activity within trusted executables.

Stage 3: Loader Component

The loader module connects to the C2 server using HTTP/HTTPS connections with hardcoded User-Agent strings (notably "GoogleBot") for identification. It downloads encrypted payload packages from the attacker's infrastructure. The loader employs DLL side-loading techniques, placing malicious DLLs alongside legitimate executables to achieve persistence and execution.

Stage 4: Core Backdoor (CastleBot)

The core module establishes robust C2 communication and awaits task instructions. It gathers system information including:

  • Computer name and username

  • Operating system version and architecture

  • Installed applications and security products

  • Network configuration

  • Active process list

This reconnaissance data allows operators to filter victims and determine appropriate secondary payloads.

Payload Deployment

Based on C2 instructions, CastleLoader downloads and executes various malware families:

  • Information Stealers: DeerStealer, RedLine, StealC, Rhadamanthys, MonsterV2 - These extract credentials from browsers, email clients, FTP clients, cryptocurrency wallets, and VPN software

  • Remote Access Trojans: NetSupport RAT, SectopRAT, CastleRAT - These provide persistent backdoor access for command execution, file manipulation, and lateral movement

  • Additional Loaders: Hijack Loader (GhostPulse) - These extend the infection chain, enabling deployment of even more malware variants.

Sandbox Analysis of CastleLoader Sample

ANY.RUN’s analysts have detonated a CastleLoader sample in the Interactive Sandbox to extract runtime configuration, C2 infrastructure, and high-confidence IOCs.

View analysis

CastleLoader sandbox analysis CastleLoader dissected in the Interactive Sandbox

What instantly grabs attention here is a system process chain, at the end of which a request to 94[.]159[.]113[.]32:80 was sent.

Binary analysis shows that the process incorporates Object Pascal (Delphi) and Inno Setup Module (installer).

The static and dynamic analysis of the components reveals the path to the payload delivery. You can read the detailed analysis in ANY.RUN’s Blog.

The original Inno Setup installer turned out to be a container with a set of auxiliary files, among which the AutoIt3.exe + freely.a3x combination played a key role. It is possible to extract and partially decompile the AutoIt script.

Static analysis showed that the script prepares the environment and launches the next stage, while dynamic analysis confirmed that after jsc.exe is started, one of the process hollowing techniques is executed: another executable module is injected into the process’s address space.

As a result, a fully functional PE file — the main CastleLoader module — was discovered inside the process.

Such a sophisticated multi-stage execution chain was not implemented merely to complicate analysis, but specifically as an attempt to conceal the execution of the main payload from detection mechanisms. Using Inno Setup as a container, an AutoIt script as an intermediate layer, and process hollowing over jsc.exe, allows CastleLoader to distribute across several components that appear benign at first glance.

The execution model reduces the likelihood of detection, as each individual stage appears legitimate, and the final payload only manifests in memory after the controlled process has been altered. As a result, static signatures, simple behavioral heuristics, and process monitoring systems become ineffective. A fully functional malicious module exists only at runtime, and only within an already modified process.

Gathering Threat Intelligence on CastleLoader Malware

ANY.RUN's Threat Intelligence Lookup provides critical capabilities for detecting, investigating, and responding to CastleLoader threats:

Rapid IOC Validation and Enrichment

When security alerts trigger on potential CastleLoader indicators (IPs, domains, file hashes, PowerShell command patterns), SOC analysts can query TI Lookup to instantly determine if an indicator is associated with known CastleLoader campaigns. The platform provides contextual information including malware family classification, campaign attribution, and related artifacts - turning isolated indicators into actionable intelligence within seconds.

Deep Behavioral Analysis Access

TI Lookup provides direct links to interactive sandbox sessions where CastleLoader was analyzed. Analysts can observe the complete execution chain. Start exploring with the threat name lookup:

threatName:"castleloader".

CastleLoader sandbox analyses Fresh CastleLoader sandbox analyses found via TI Lookup

Comprehensive Event Correlation

With over 40 search parameters including registry keys, process command lines, network connections, file paths, and TLS fingerprints, analysts can investigate CastleLoader infections across multiple dimensions. For example, searching for specific registry modifications or PowerShell patterns associated with ClickFix campaigns reveals all related samples and campaigns in the database.

YARA Rule Development and Testing

TI Lookup's integrated YARA Search allows security teams to scan ANY.RUN's threat intelligence database with custom detection rules. Teams can develop YARA rules targeting CastleLoader's unique characteristics (specific API call patterns, mutex names, shellcode signatures) and immediately test them against millions of analyzed samples to validate effectiveness and minimize false positives.

Threat Hunting Capabilities

Analysts can proactively search for CastleLoader indicators that may have bypassed initial detection.

Value for SOCs and MSSPs:

  • Reduced Mean Time to Respond (MTTR);

  • Lower False Positive Rates;

  • Enhanced Detection Coverage;

  • Improved Analyst Efficiency;

  • Cost Optimization.

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Conclusion

CastleLoader exemplifies how modern malware prioritizes access over immediate impact. By the time defenders notice the loader, the real damage may already be queued for deployment. Combating such threats requires not just detection, but context, speed, and intelligence-driven response. Threat intelligence turns CastleLoader from a silent entry point into a visible, disruptable operation.

Trial TI Lookup to start gathering actionable threat intelligence on the malware that threatens your business sector and region: just sign up to ANY.RUN.

HAVE A LOOK AT

BlackMoon screenshot
BlackMoon
blackmoon
BlackMoon also known as KrBanker is a trojan aimed at stealing payment credentials. It specializes in man-in-the-browser (MitB) attacks, web injection, and credential theft to compromise users' online banking accounts. It was first noticed in early 2014 attacking banks in South Korea and has impressively evolved since by adding a number of new infiltration techniques and information stealing methods.
Read More
RondoDox screenshot
RondoDox
rondodox
RondoDox is an emerging Linux-based botnet malware that exploits dozens of known vulnerabilities in internet-facing devices like routers, DVRs, and web servers to build massive networks for DDoS attacks, cryptomining, and data exfiltration. First spotted in mid-2025, its "exploit shotgun" tactic (firing multiple payloads at once) has made it a rapid escalator in the IoT threat landscape, compromising unpatched edge devices worldwide.
Read More
Salty 2FA screenshot
Salty 2FA
salty2fa
Salty 2FA is a sophisticated Phishing-as-a-Service (PhaaS) framework tailored to hijack user sessions, steal credentials, and gain unauthorized access to corporate systems. Delivered primarily via targeted emails, this kit employs multi-stage evasion tactics, making it a stealthy tool for cybercriminals aiming at high-value enterprise accounts.
Read More
Keylogger screenshot
Keylogger
keylogger
A keylogger is a type of spyware that infects a system and has the ability to record every keystroke made on the device. This lets attackers collect personal information of victims, which may include their online banking credentials, as well as personal conversations. The most widespread vector of attack leading to a keylogger infection begins with a phishing email or link. Keylogging is also often present in remote access trojans as part of an extended set of malicious tools.
Read More
Orcus RAT screenshot
Orcus RAT
orcus rat trojan
Orcus is a modular Remote Access Trojan with some unusual functions. This RAT enables attackers to create plugins using a custom development library and offers a robust core feature set that makes it one of the most dangerous malicious programs in its class.
Read More
Virlock screenshot
Virlock
virlock
Virlock is a unique ransomware strain that combines encryption capabilities with file infection techniques. First observed in 2014, it stands out due to its polymorphic nature and ability to embed its code into compromised files, ensuring continued propagation. Once it infects a system, it encrypts files and locks the screen, demanding a ransom for file recovery and system access.
Read More