Malicious DeepSeek-Claw OpenClaw skill delivers Remcos RAT and GhostLoader stealer via supply chain attack
A threat actor published a malicious "DeepSeek-Claw" skill to the OpenClaw skill ecosystem on GitHub, exploiting developer trust in the skill marketplace to deliver Remcos RAT and GhostLoader stealer malware. The attack targeted developers and AI-driven systems using OpenClaw, leveraging supply chain poisoning of the skill publishing workflow.
Date
Mar 1, 2026
First Seen
Mar 1, 2026
Last Reviewed
May 11, 2026
Publisher
Cryptika
Source Type
article
Related reading
OpenClaw Security GuideA practical baseline for local binding, scoped credentials, sandboxing, runtime checks, and Armorer Guard.
Securing OpenClaw with Armorer GuardHow Armorer wraps OpenClaw with managed setup, Docker hardening, health checks, approvals, and Guard-backed scanning.
Malicious DeepSeek-Claw OpenClaw Skill Campaign
Summary
A threat actor published a malicious "DeepSeek-Claw" skill to the OpenClaw skill ecosystem on GitHub, exploiting developer trust in the skill marketplace to deliver Remcos RAT and GhostLoader stealer malware. The attack targeted developers and AI-driven systems using OpenClaw, leveraging supply chain poisoning of the skill publishing workflow.
Why It Matters
OpenClaw skills are a trusted integration point — developers install them believing they are safe. This campaign abused that trust model to gain code execution on developer workstations and automate credential theft through the agent runtime. The cross-platform reach (Windows, macOS, Linux) means the attack surface spans the entire development environment.
Attack Path
- Skill publication: Attacker publishes fake "DeepSeek-Claw" skill on GitHub, mimicking a legitimate AI workflow integration.
- Malicious payload in SKILL.md: Hidden PowerShell commands embedded in the skill's SKILL.md file are executed during skill installation/setup.
- MSI download: PowerShell commands contact
hxxps://cloudcraftshub[.]com/apiorhxxp://dropras[.]xyz/to download a malicious MSI installer. - DLL sideloading: MSI drops a legitimate GoToMeeting executable alongside a malicious DLL. The DLL is loaded via DLL sideloading to bypass application control.
- In-memory patching: The DLL patches security tools in memory, then launches the final payload.
- Dual malware deployment:
- Remcos RAT: Opens an encrypted C2 channel to
146[.]19.24[.]131:2404, giving attackers full remote access. - GhostLoader stealer: Contacts
hxxps://trackpipe[.]devto exfiltrate credentials, keys, and other sensitive data.
- Remcos RAT: Opens an encrypted C2 channel to
Affected Systems
Windows, macOS, Linux (cross-platform via OpenClaw skill installation mechanism).
Indicators of Compromise
- Skill installation from untrusted GitHub repositories mimicking DeepSeek integrations.
- Unexpected PowerShell child processes during skill setup.
- MSI installer downloads from
cloudcraftshub[.]comordropras[.]xyz/. - Outbound connections to
146[.]19.24[.]131:2404(Remcos C2). - Outbound connections to
trackpipe[.]dev(GhostLoader C2). - Legitimate executables (e.g., GoToMeeting) spawning suspicious child processes.
- Unexplained DLL loading alongside known-safe executables.
File IOCs
- MD5:
1c267cab0a800a7b2d598bc1b112d5ce— "DeepSeek-Claw" malicious skill - MD5:
2A5F619C966EF79F4586A433E3D5E7BA— Malicious MSI installer - G2M.exe — Legitimate signed GoToMeeting executable (used for DLL sideloading)
- g2m.dll — Malicious sideloaded DLL; shellcode loader with ETW patching (overwrites ntdll!EtwEventWrite), AMSI bypass (patches amsi!AmsiScanBuffer to return AMSI_RESULT_CLEAN), Tiny Encryption Algorithm (TEA) in CBC mode with 128-bit key, manual PEB parsing for dynamic API resolution, anti-debugging (PEB BeingDebugged/NtGlobalFlag checks, Sleep timing analysis, INT 3 breakpoint scanning), analysis-tool blocklisting (ida.exe, x64dbg.exe, wireshark.exe), VM/sandbox mutex detection (VMware, VBox, Sandboxie)
- Mutex:
Rmc-11YWBZ - Remcos license key:
82536825E700F4C863238A90DD314687
Network IOCs
hxxps://cloudcraftshub[.]com/api— MSI download endpointhxxp://dropras[.]xyz/— MSI download endpointtcp+tls://146[.]19.24[.]131:2404— Remcos RAT C2hxxps://trackpipe[.]dev— GhostLoader C2
Detection
- Win32.Backdoor.RemcosRat, Win32.Dropper.RemcosRat (Zscaler)
TTPs
- T1195.002 — Supply Chain Compromise: Software Development Tools
- T1204.002 — User Execution: Malicious File
- T1059.001 — Command and Scripting Interpreter: PowerShell
- T1574.001 — Hijack Execution Flow: DLL Search Order Hijacking
- T1574.002 — Hijack Execution Flow: DLL Side-Loading
- T1055 — Process Injection
- T1056.003 — Input Capture: Credential API Hooking
- T1041 — Exfiltration Over C2 Channel
Mitigations
- Audit installed OpenClaw skills; remove any from untrusted or unverified sources.
- Enforce code signing for skills; only allow community-verified skill publishers.
- Monitor for unexpected PowerShell execution during skill installation.
- Block outbound connections to IOCs at the network perimeter.
- Deploy application control to prevent unsigned DLL loading.
- Use hardware-bound credentials and enforce least-privilege for agent tool access.