Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

Pulsar RAT

117
Global rank
34 infographic chevron month
Month rank
23 infographic chevron week
Week rank
0
IOCs

Pulsar RAT is a derivative of Quasar RAT with extensive functionality including keylogging, cryptocurrency wallet clipping, credential theft, file management, remote shell execution, and data exfiltration capabilities. As a modular, open-source remote administration tool designed for Windows systems, Pulsar introduces significant enhancements over its predecessor.

RAT
Type
Unknown
Origin
1 April, 2025
First seen
20 January, 2026
Last seen

How to analyze Pulsar RAT with ANY.RUN

RAT
Type
Unknown
Origin
1 April, 2025
First seen
20 January, 2026
Last seen

IOCs

Last Seen at

Recent blog posts

post image
Malware Trends Report 2025: New Security Risk...
watchers 349
comments 0
post image
ANY.RUN & Tines: Scale SOC and Meet SLAs...
watchers 2256
comments 0
post image
German Manufacturing Under Phishing Attacks:...
watchers 4629
comments 0

Pulsar RAT Exposed: Modular Menace with Clipboard Hijacking and Supply Chain Tricks

Key Takeaways

  1. Pulsar RAT is an evolution of Quasar RAT with enhanced stealth, comprehensive surveillance capabilities including webcam and microphone access, and cryptocurrency wallet clipping.
  1. The malware employs advanced evasion techniques including anti-virtualization checks, anti-debugging protections, memory-only execution, and multi-layered obfuscation.
  1. Supply chain attacks represent a growing distribution vector.
  1. Business impact extends far beyond technical compromise with organizations facing intellectual property theft, regulatory violations, operational disruption requiring 200-500 person-hours for remediation, and potential supply chain compromise affecting partners.
  1. Defense requires layered security controls combining EDR platforms, network segmentation, user security awareness training that prevents 60-90% of social engineering attacks.
  1. TI Lookup delivers instant threat intelligence enabling security teams to rapidly search for Pulsar RAT indicators across URLs, domains, and IP addresses, retrieving comprehensive intelligence including sample analysis results, network infrastructure, and campaign data.

destinationIP:"72.230.113.5".

IP detected as Pulsar RAT Suspicious IP detected as Pulsar IOC, plus most targeted sectors and regions

  1. ANY.RUN's Interactive Sandbox provides deep analysis capabilities for security teams investigating suspicious files, enabling manual interaction with samples to trigger specific behaviors and explore malware functionality that automated analysis might miss.

View analysis

Pulsar RAT sample in Interactive Sandbox Pulsar RAT attack chain in ANY.RUN’s Sandbox

What is Pulsar RAT Malware?

Pulsar RAT represents an evolved fork of the popular open-source Quasar RAT, enhancing its predecessor with additional features and improved stealth. Developed as a modular .NET-based tool, it offers comprehensive remote administration capabilities that can be legitimately used for IT management but are frequently abused by cybercriminals for unauthorized access, espionage, and data theft.

Key enhancements include TLS-encrypted communications, hidden virtual network computing (HVNC) for stealthy remote desktop access, reverse proxy support, and a plugin system for customization. It incorporates specialized modules for credential harvesting (known as Kematian Grabber), cryptocurrency clipboard hijacking, and even "FunStuff" features like screen distortions or fake BSOD triggers.

Pulsar stands out for its robust anti-analysis techniques, making it challenging for security tools to detect and analyze. The malware employs robust anti-virtualization and anti-debugging techniques, code injection capabilities, and built-in obfuscation and packing mechanisms specifically designed to evade detection by security solutions. Its modular design allows for seamless plugin additions, enabling operators to customize functionality for specific campaign objectives.

The tool even includes creative modules labeled "FunStuff" that enable operations like GDI effects, blue screen of death triggers, mouse swapping, and taskbar hiding, showcasing versatility that extends beyond conventional remote administration applications.

First observed in the wild around 2025, Pulsar has been deployed in targeted campaigns, including supply chain attacks, demonstrating its adaptability in the hands of threat actors.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Pulsar RAT Victimology

Pulsar RAT primarily targets Windows users and organizations across various sectors. Known incidents, such as the malicious npm package campaign, suggest a focus on software developers and tech-savvy individuals who install third-party libraries. However, as a versatile RAT, it can affect businesses of all sizes, particularly those with remote workforces or weak endpoint security.

Victims often include small-to-medium enterprises lacking advanced EDR solutions, as well as individual users exposed through phishing or malicious downloads. There is no strong evidence of nation-state targeting, but its data theft features make it appealing for financially motivated attackers seeking credentials, cryptocurrencies, or sensitive corporate data.

What Are Examples of the Most Successful Pulsar RAT Attacks?

This RAT is relatively new, so large-scale campaigns are limited, but notable incidents include:

  • 2025 npm Supply Chain Attack: Malicious packages "solders" and "@mediawave/lib" (published by "codewizguru") used extreme obfuscation and steganography to infect developers installing the libraries, achieving hundreds of weekly downloads before detection.

  • Multi-RAT Deployments: Samples linked to open directories dropping Pulsar alongside Quasar, NjRAT, and XWorm, indicating opportunistic or targeted infections.

No massive breaches publicly attributed yet, but its features suggest potential use in credential theft or precursor to ransomware.

How Pulsar RAT Infiltrates and Functions

Initial access typically occurs through social engineering or supply chain compromises:

  • Malicious Downloads: Phishing emails with laced attachments or links.
  • Supply Chain Attacks: Notably, the 2025 "solders" npm package campaign used 7+ layers of obfuscation (Unicode variables, hex encoding, Base64, steganography in PNG images) to deliver the payload automatically via postinstall scripts.
  • Cracked Software or Pirated Tools: Common distribution vector for RATs like this.

Once inside, it persists via startup entries or scheduled tasks but focuses on stealth rather than worm-like spreading. Lateral movement relies on attacker commands (e.g., via proxy).

Pulsar operates via a client-server model. The client (stub) on the victim machine connects to the attacker's C2 server using encrypted channels (TLS).

The malware retrieves C2 configuration from public paste sites like Pastebin, decrypts the configuration using embedded keys to obtain the C2 server IP or domain, then establishes a BCrypt-encrypted connection using the MessagePack binary protocol for command transmission.

The MessagePack binary protocol enables efficient command serialization and deserialization, allowing attackers to send complex instructions and receive detailed responses about system state.

The malware incorporates multiple evasion techniques to avoid detection during security analysis. Anti-virtualization checks inspect disk labels for strings common in virtual machines like "QEMU HARDDISK." If such indicators are present, execution stops immediately, ensuring the payload avoids sandbox analysis tools.

Code injection capabilities allow the malware to execute within legitimate processes, making detection based on process names ineffective.

Advanced deployment methods load the payload directly into memory via .NET reflection without writing files to disk. This fileless approach bypasses disk-based security monitoring and reduces forensic visibility, making incident response significantly more challenging.

The plugin-based design allows operators to load additional functionality without recompiling the core malware. Modules can be added or removed based on specific campaign requirements, target environments, or evolving attacker objectives.

Sandbox Analysis of a Pulsar RAT Sample

ANY.RUN’s Interactive Sandbox overcomes Pulsar’s ant-detection and sandbox-evasion mechanics, exposing the full attack chain. For this RAT, the Sandbox can reveal unpacking routines, persistence mechanisms, network communications, and data exfiltration attempts.

View a Pulsar RAT sample analysis

Pulsar RAT Sandbox analysis Pulsar RAT detonated in the Interactive Sandbox

In this sample, a quite simple BAT file is created (C:\Users\admin\AppData\Local\Temp\28c726a0.bat):

BAT file created at the start of the attack BAT file created at the start of the attack

This file is used for UAC bypassing at the next step. The mechanism works as follows:

First, the DelegateExecute value is cleared in the registry key HKEY_CLASSES_ROOT\ms-settings\Shell\Open\command. This is necessary so that when ms-settings is opened, the system does not use the COM handler specified in the DelegateExecute value. In this case, the handler is taken directly from the (Default) value.

Therefore, the next step writes a malicious command into the (Default) value: this command launches a BAT file and then runs the legitimate program computerdefaults.exe.

The full attack chain proceeds as follows:

Pulsar process succession Pulsar process succession

After the attack executes, the modified registry values are cleared to cover tracks.

The BAT file then launches the executable with elevated privileges. This executable, in turn, creates a scheduled task in Task Scheduler. The task is configured to run at every user logon with HIGHEST privileges.

Malicious file disguised as svchost.exe Malicious file disguised as svchost.exe

This file is a disguised Pulsar RAT, as confirmed by a YARA rule trigger.

Pulsar detected by YARA rule Pulsar detected by YARA rule

After Pulsar finished collecting system information, execution stopped.

Gathering Threat Intelligence on Pulsar RAT Malware

By searching for known Pulsar RAT indicators, security teams retrieve comprehensive intelligence including sample analysis results, network connections, related infrastructure, and historical campaign data. This accelerates investigations by providing immediate context without requiring manual sample collection and analysis.

Start by querying the threat’s name in ANY.RUN’s Threat Intelligence Lookup.

threatName:"pulsar"

Pulsar indicators and targeted industries Pulsar indicators and targeted industries

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Conclusion

Pulsar RAT is a reminder that quiet threats can be the most dangerous. By prioritizing persistence and access, it enables attackers to move patiently, exploit trust, and maximize long-term impact. Organizations that combine proactive detection, sandbox analysis, and high-quality threat intelligence stand the best chance of uncovering and stopping such intrusions early.

Trial TI Lookup to start gathering actionable threat intelligence on the malware that threatens your business sector and region: just sign up to ANY.RUN.

HAVE A LOOK AT

Oyster screenshot
Oyster
oyster
Oyster (also seen in reporting as Broomstick or CleanUpLoader) is a Windows backdoor/loader actively used in multi-stage intrusion campaigns. Recent campaigns weaponize SEO-poisoning and malvertising to trick IT and dev users into downloading trojanized installers (PuTTY, WinSCP, Microsoft Teams, etc.), which then drop Oyster to establish a persistent foothold and load additional payloads (often leading to data theft or ransomware).
Read More
PureCrypter screenshot
PureCrypter
purecrypter
First identified in March 2021, PureCrypter is a .NET-based loader that employs obfuscation techniques, such as SmartAssembly, to evade detection. It has been used to distribute malware families including AgentTesla, RedLine Stealer, and SnakeKeylogger. The malware is typically delivered through phishing campaigns and malicious downloads, often masquerading as legitimate files with extensions like .mp4 or .pdf. PureCrypter utilizes encryption and compression to conceal its payloads and can inject malicious code into legitimate processes to maintain persistence on the infected system.
Read More
CryptoWall screenshot
CryptoWall
cryptowall
CryptoWall is a notorious ransomware family that emerged in early 2014 and rapidly became one of the most destructive cyber threats of its time. This malware encrypts victims' files using strong AES encryption, demands ransom payments in Bitcoin, and has generated hundreds of millions of dollars for cybercriminals.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
SVCStealer screenshot
SVCStealer
svcstealer
SVCStealer is an information-stealing malware targeting sensitive user data through spear-phishing email attachments. It systematically extracts credentials, financial data, and system information from various applications, including browsers and messaging platforms.
Read More
Rootkit screenshot
Rootkit
rootkit bootkit
A rootkit is a type of malicious software designed to provide unauthorized administrative-level access to a computer or network while concealing its presence. Rootkits are tools used by cybercriminals to hide their activities, including keyloggers, spyware, and other malware, often enabling long-term system exploitation.
Read More