250. CastleRAT Abuses Steam Community Pages to Store C2 Addresses

Hello everyone!

Dead Drop Resolver (T1102.001) technique becomes more and more popular among adversaries. Let's look at another example - how threat actors abuse Steam Community pages.

We'll look at CastleRAT. Since August 2025, the malware leverages Steam Community pages as C2 dead drops. It means that we can hunt for suspicious resolutions of steamcommunity[.]com. Of course, you should not forget about exclusions, so here's what to exclude based on my telemetry:

event_type: "dnsreqwin"

AND

dns_rname: "steamcommunity.com"

AND NOT

proc_file_path: ("steam.exe" OR "steam" OR "kaspersky" OR "windows defender" OR "networkservice.exe" OR "svchost.exe" OR "Counter Strike" OR "McAfee" OR "eaanticheat.gameservice.exe" OR "WinProxy" OR "NetLimiter" OR "cs.exe" OR "rave.exe" OR "ScumLauncher.exe" OR "ExpressConnect" OR "steamwebhelper.exe" OR "gearupbooster" OR "ipconfig.exe" OR "steamapps" OR "cFosSpeed" OR "arc.exe" OR "UrbanVPN" OR "wmiprvse.exe" OR "PycharmProjects" OR "Screaming Frog SEO Spider" OR "docker" OR "IntelConnectivityNetworkService.exe" OR "DrWeb" OR "powertoys" OR "hl2.exe")

And yes, you may have other exclusions - it depends on your environment.

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge