Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • The Hacker News
  • Microsoft Warns of StilachiRAT: A Stealthy RAT Targeting Credentials and Crypto Wallets
  • The Hacker News

Microsoft Warns of StilachiRAT: A Stealthy RAT Targeting Credentials and Crypto Wallets

[email protected] The Hacker News March 18, 2025
0

StilachiRAT Targeting Credentials and Crypto Wallets

Microsoft is calling attention to a novel remote access trojan (RAT) named StilachiRAT that it said employs advanced techniques to sidestep detection and persist within target environments with an ultimate aim to steal sensitive data.

The malware contains capabilities to “steal information from the target system, such as credentials stored in the browser, digital wallet information, data stored in the clipboard, as well as system information,” the Microsoft Incident Response team said in an analysis.

The tech giant said it discovered StilachiRAT in November 2024, with its RAT features present in a DLL module named “WWStartupCtrl64.dll.” The malware has not been attributed to any specific threat actor or country.

It’s currently not clear how the malware is delivered to targets, but Microsoft noted that such trojans can be installed via various initial access routes, making it crucial for organizations to implement adequate security measures.

Cybersecurity

StilachiRAT is designed to gather extensive system information, including operating system (OS) details, hardware identifiers like BIOS serial numbers, camera presence, active Remote Desktop Protocol (RDP) sessions, and running graphical user interface (GUI) applications.

These details are collected through the Component Object Model (COM) Web-based Enterprise Management (WBEM) interfaces using WMI Query Language (WQL).

It’s also engineered to target a list of cryptocurrency wallet extensions installed within the Google Chrome web browser. The list encompasses Bitget Wallet, Trust Wallet, TronLink, MetaMask, TokenPocket, BNB Chain Wallet, OKX Wallet, Sui Wallet, Braavos – Starknet Wallet, Coinbase Wallet, Leap Cosmos Wallet, Manta Wallet, Keplr, Phantom, Compass Wallet for Sei, Math Wallet, Fractal Wallet, Station Wallet, ConfluxPortal, and Plug.

Furthermore, StilachiRAT extracts credentials stored in the Chrome browser, periodically collects clipboard content such as passwords and cryptocurrency wallets, monitors RDP sessions by capturing foreground window information, and establishes contact with a remote server to exfiltrate the harvested data.

The command-and-control (C2) server communications are two-way, allowing the malware to launch instructions sent by it. The features point to a versatile tool for both espionage and system manipulation. As many as 10 different commands are supported –

  • 07 – Display a dialog box with rendered HTML contents from a supplied URL
  • 08 – Clear event log entries
  • 09 – Enable system shutdown using an undocumented Windows API (“ntdll.dll!NtShutdownSystem”)
  • 13 – Receive a network address from the C2 server and establish a new outbound connection.
  • 14 – Accept an incoming network connection on the supplied TCP port
  • 15 – Terminate open network connections
  • 16 – Launch a specified application
  • 19 – Enumerate all open windows of the current desktop to search for a requested title bar text
  • 26 – Put the system into either a suspended (sleep) state or hibernation
  • 30 – Steal Google Chrome passwords

“StilachiRAT displays anti-forensic behavior by clearing event logs and checking certain system conditions to evade detection,” Microsoft said. “This includes looping checks for analysis tools and sandbox timers that prevent its full activation in virtual environments commonly used for malware analysis.”

Cybersecurity

The disclosure comes as Palo Alto Networks Unit 42 detailed three unusual malware samples that it detected last year, counting a passive Internet Information Services (IIS) backdoor developed in C++/CLI, a bootkit that uses an unsecured kernel driver to install a GRUB 2 bootloader, and a Windows implant of a cross-platform post-exploitation framework developed in C++ called ProjectGeass.

The IIS backdoor is equipped to parse certain incoming HTTP requests containing a predefined header and execute the commands within them, granting it the ability to run commands, get system metadata, create new processes, execute PowerShell code, and inject shellcode into a running or new process.

The bootkit, on the other hand, is a 64-bit DLL that installs a GRUB 2 bootloader disk image by means of a legitimately signed kernel driver named ampa.sys. It’s assessed to be a proof-of-concept (PoC) created by unknown parties from the University of Mississippi.

“When rebooted, the GRUB 2 bootloader shows an image and periodically plays Dixie through the PC speaker. This behavior could indicate that the malware is an offensive prank,” Unit 42 researcher Dominik Reichel said. “Notably, patching a system with this customized GRUB 2 bootloader image of the malware only works on certain disk configurations.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

About The Author

[email protected] The Hacker News

See author's posts

Original post here

Continue Reading

Previous: Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum
Next: ChatGPT Vulnerability Exploited Against US Government Organizations

Trending Now

Oops: DanaBot Malware Devs Infected Their Own PCs Oops: DanaBot Malware Devs Infected Their Own PCs 1

Oops: DanaBot Malware Devs Infected Their Own PCs

May 22, 2025
Oops: DanaBot Malware Devs Infected Their Own PCs danabot.png 2

Oops: DanaBot Malware Devs Infected Their Own PCs

May 22, 2025
Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks chinese-hackers-attacking.jpg 3

Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks

May 22, 2025
Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise exploitss.jpg 4

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise

May 22, 2025
Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks chinese.jpg 5

Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks

May 22, 2025
Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program cyber-program.jpg 6

Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program

May 22, 2025

Related Stories

chinese-hackers-attacking.jpg
  • The Hacker News

Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks

[email protected] The Hacker News May 22, 2025 0
exploitss.jpg
  • The Hacker News

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise

[email protected] The Hacker News May 22, 2025 0
chinese.jpg
  • The Hacker News

Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks

[email protected] The Hacker News May 22, 2025 0
cyber-program.jpg
  • The Hacker News

Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program

[email protected] The Hacker News May 22, 2025 0
exploit.jpg
  • The Hacker News

Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host

[email protected] The Hacker News May 22, 2025 0
main.jpg
  • The Hacker News

Identity Security Has an Automation Problem—And It’s Bigger Than You Think

[email protected] The Hacker News May 22, 2025 0

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

Oops: DanaBot Malware Devs Infected Their Own PCs Oops: DanaBot Malware Devs Infected Their Own PCs 1
  • Uncategorized

Oops: DanaBot Malware Devs Infected Their Own PCs

May 22, 2025
Oops: DanaBot Malware Devs Infected Their Own PCs danabot.png 2
  • Krebs On Security

Oops: DanaBot Malware Devs Infected Their Own PCs

May 22, 2025
Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks chinese-hackers-attacking.jpg 3
  • The Hacker News

Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks

May 22, 2025
Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise exploitss.jpg 4
  • The Hacker News

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise

May 22, 2025
Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks chinese.jpg 5
  • The Hacker News

Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks

May 22, 2025
Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program cyber-program.jpg 6
  • The Hacker News

Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program

May 22, 2025
Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host exploit.jpg 7
  • The Hacker News

Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host

May 22, 2025

You may have missed

Oops: DanaBot Malware Devs Infected Their Own PCs
  • Uncategorized

Oops: DanaBot Malware Devs Infected Their Own PCs

Sean May 22, 2025 0
danabot.png
  • Krebs On Security

Oops: DanaBot Malware Devs Infected Their Own PCs

BrianKrebs May 22, 2025 0
chinese-hackers-attacking.jpg
  • The Hacker News

Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks

[email protected] The Hacker News May 22, 2025 0
exploitss.jpg
  • The Hacker News

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise

[email protected] The Hacker News May 22, 2025 0
Copyright © 2025 All rights reserved. | MoreNews by AF themes.