SpyMax Variant Targeting Chinese-Speaking Users
In recent years, the cybersecurity space has seen a proliferation of tools that are both useful and dangerous, depending on who is using them. Pulsar RAT is one of these tools.Some tools in cybersecurity walk a fine line between utility and threat. Although designed for legitimate remote administration, it is increasingly being used for cyberattacks, espionage, and credential theft.
Unlike typical Android malware, this campaign exploits Android Accessibility Services using polished social engineering techniques and deceptive UI elements. Once granted permissions, the spyware gains near-total control of the device—accessing messages, calls, GPS data, the camera, microphone, and more.
Hidden Desktop Access (HVNC)
Encrypted Communication (TLS)
Integrated Keylogger
Clipboard Password Cracker
Stealing Identities from Browsers and Apps
Webcam and Microphone Spying
Script Execution (PowerShell, Batch, JavaScript)
Screen Distortion and Taskbar Hiding
Once installed, Pulsar gives the attacker full control. The software runs silently, without visible windows or icons.
Detects VMs, debuggers, and testbeds
Hide its presence from the taskbar and startup lists
Uses AES-256 encryption to securely exfiltrate data
Changes file name, icon, and metadata for privacy.
Pulsar uses advanced methods to steal user data:
WMI Queries to get system and hardware information
Extracting passwords from:
Browsers: Chrome, Firefox, Edge, Opera, etc.
Applications: Discord, Telegram, Steam, FileZilla, etc.
Crypto Clipper modifies BTC/ETH addresses copied to the clipboard
To defend against threats like Pulsar RAT:
✅ Best Practices
Use Endpoint Detection and Response (EDR) tools
Disable unnecessary scheduled tasks and registry autoruns
Implement YARA/Sigma rules (available on ThreatMon GitHub)
Monitor for unusual WMI activity and network connections
Restrict remote access with strict firewall rules
Pulsar RAT is a powerful and flexible tool that shows how cyber threats are evolving. While open-source tools like these may seem harmless at first, they can be serious weapons in the wrong hands. Keeping your systems safe means understanding how these tools work and staying one step ahead.
ThreatMon White Paper