Verticals Targeted: Not specified
Regions Targeted: US
Related Families: CastleLoader
Key Takeaways
What is CastleRAT?
TAG-150’s operations often begin with phishing campaigns, notably Cloudflare-themed “ClickFix” attacks and fraudulent GitHub repositories posing as legitimate software. These lures trick users into executing malicious PowerShell commands, achieving a 28.7% infection rate among those interacting with the malicious links. CastleLoader, a key initial vector, delivers secondary payloads like SectopRAT, WarmCookie, and various infostealers. The newly identified CastleRAT enhances TAG-150’s capabilities, with the Python variant (also known as PyNightshade) focusing on lightweight functionality, such as system information collection and command execution, while the C variant adds advanced features like keylogging and screen capturing. Both variants use RC4 encryption with hard-coded 16-byte keys and query the ip-api.com geolocation service to gather victim data.
The infrastructure is extensive, with Tier 1 C2 servers hosted by providers like FEMO IT SOLUTIONS LIMITED and Eonix Corporation, using domains registered via NameCheap and TUCOWS. CastleLoader C2 servers typically operate on port 80, with admin panels on port 5050 or 9999, while CastleRAT servers use ports 443, 7777, and 33336. Higher-tier servers (Tiers 2–4) facilitate management, with some direct connections bypassing intermediate layers, suggesting operational flexibility or multiple operators. A Russian residential IP, linked to AS35807, communicates with Tox servers, indicating internal coordination via secure messaging.
TAG-150’s ecosystem includes services like Kleenscan for anti-detection, temp.sh for file sharing, and Steam Community for C2 dead drops, showcasing adaptability to evade detection. A potential link to Play Ransomware was noted, with a WarmCookie C2 server tied to a known ransomware victim, though no definitive connection has been established. PolySwarm analysts consider CastleRAT to be an emerging threat.
PolySwarm has multiple samples associated with this activity.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 can use the following CLI command to search for all CastleRAT samples in our portal:
$ polyswarm link list -f CastleRAT
Don’t have a PolySwarm account? Go here to sign up for a free Community plan or subscribe.
Contact us at hivemind@polyswarm.io | Check out our blog | Subscribe to our reports.