DeedRAT: Unpacking a Modern Backdoor's Playbook

Jan. 2, 2026, 11:02 a.m.

Description

DeedRAT is a sophisticated backdoor associated with the Chinese APT group Salt Typhoon, targeting critical sectors globally. It infiltrates systems through phishing campaigns, utilizing DLL sideloading to evade detection. The malware establishes persistence via registry run keys and service creation, ensuring long-term access. DeedRAT's capabilities include file manipulation, system reconnaissance, and payload execution. The infection chain involves three files: a legitimate executable, a malicious DLL, and an encrypted file. Once installed, it attempts to connect to its command-and-control server. Defensive measures include monitoring email traffic, registry changes, and anomalous service creations.

Date

  • Created: Dec. 31, 2025, 10:59 p.m.
  • Published: Dec. 31, 2025, 10:59 p.m.
  • Modified: Jan. 2, 2026, 11:02 a.m.

Indicators

  • 99a0b424bb3a6bbf60e972fd82c514fd971a948f9cedf3b9dc6b033117ecb106
  • e356dbd3bd62c19fa3ff8943fc73a4fab01a6446f989318b7da4abf48d565af2
  • 2d9107edad9f674f6ca1707d56619a355227a661163f18b5794326d4f81a2803
  • 52f489d47618db8dfb503d6da98cbd76d08b063cc7ce0aac02b03601b6cae6a1

Attack Patterns

Additional Informations

  • Telecommunications
  • Government
  • luckybear669.kozow.com
  • South Africa