Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Microsoft Warns of StilachiRAT: A Stealthy RAT Targeting Credentials and Crypto Wallets

The Hacker News by The Hacker News
March 18, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Microsoft is calling attention to a novel remote access trojan (RAT) named StilachiRAT that it said employs advanced techniques to sidestep detection and persist within target environments with an ultimate aim to steal sensitive data.

The malware contains capabilities to “steal information from the target system, such as credentials stored in the browser, digital wallet information, data stored in the clipboard, as well as system information,” the Microsoft Incident Response team said in an analysis.

The tech giant said it discovered StilachiRAT in November 2024, with its RAT features present in a DLL module named “WWStartupCtrl64.dll.” The malware has not been attributed to any specific threat actor or country.

It’s currently not clear how the malware is delivered to targets, but Microsoft noted that such trojans can be installed via various initial access routes, making it crucial for organizations to implement adequate security measures.

Cybersecurity

StilachiRAT is designed to gather extensive system information, including operating system (OS) details, hardware identifiers like BIOS serial numbers, camera presence, active Remote Desktop Protocol (RDP) sessions, and running graphical user interface (GUI) applications.

These details are collected through the Component Object Model (COM) Web-based Enterprise Management (WBEM) interfaces using WMI Query Language (WQL).

It’s also engineered to target a list of cryptocurrency wallet extensions installed within the Google Chrome web browser. The list encompasses Bitget Wallet, Trust Wallet, TronLink, MetaMask, TokenPocket, BNB Chain Wallet, OKX Wallet, Sui Wallet, Braavos – Starknet Wallet, Coinbase Wallet, Leap Cosmos Wallet, Manta Wallet, Keplr, Phantom, Compass Wallet for Sei, Math Wallet, Fractal Wallet, Station Wallet, ConfluxPortal, and Plug.

Furthermore, StilachiRAT extracts credentials stored in the Chrome browser, periodically collects clipboard content such as passwords and cryptocurrency wallets, monitors RDP sessions by capturing foreground window information, and establishes contact with a remote server to exfiltrate the harvested data.

The command-and-control (C2) server communications are two-way, allowing the malware to launch instructions sent by it. The features point to a versatile tool for both espionage and system manipulation. As many as 10 different commands are supported –

  • 07 – Display a dialog box with rendered HTML contents from a supplied URL
  • 08 – Clear event log entries
  • 09 – Enable system shutdown using an undocumented Windows API (“ntdll.dll!NtShutdownSystem”)
  • 13 – Receive a network address from the C2 server and establish a new outbound connection.
  • 14 – Accept an incoming network connection on the supplied TCP port
  • 15 – Terminate open network connections
  • 16 – Launch a specified application
  • 19 – Enumerate all open windows of the current desktop to search for a requested title bar text
  • 26 – Put the system into either a suspended (sleep) state or hibernation
  • 30 – Steal Google Chrome passwords

“StilachiRAT displays anti-forensic behavior by clearing event logs and checking certain system conditions to evade detection,” Microsoft said. “This includes looping checks for analysis tools and sandbox timers that prevent its full activation in virtual environments commonly used for malware analysis.”

Cybersecurity

The disclosure comes as Palo Alto Networks Unit 42 detailed three unusual malware samples that it detected last year, counting a passive Internet Information Services (IIS) backdoor developed in C++/CLI, a bootkit that uses an unsecured kernel driver to install a GRUB 2 bootloader, and a Windows implant of a cross-platform post-exploitation framework developed in C++ called ProjectGeass.

The IIS backdoor is equipped to parse certain incoming HTTP requests containing a predefined header and execute the commands within them, granting it the ability to run commands, get system metadata, create new processes, execute PowerShell code, and inject shellcode into a running or new process.

The bootkit, on the other hand, is a 64-bit DLL that installs a GRUB 2 bootloader disk image by means of a legitimately signed kernel driver named ampa.sys. It’s assessed to be a proof-of-concept (PoC) created by unknown parties from the University of Mississippi.

“When rebooted, the GRUB 2 bootloader shows an image and periodically plays Dixie through the PC speaker. This behavior could indicate that the malware is an offensive prank,” Unit 42 researcher Dominik Reichel said. “Notably, patching a system with this customized GRUB 2 bootloader image of the malware only works on certain disk configurations.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
The Hacker News

The Hacker News

Next Post
Everywoman announces 2025 Women in Technology Awards winners | Computer Weekly

Everywoman announces 2025 Women in Technology Awards winners | Computer Weekly

Recommended.

5 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation

$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation

April 5, 2026
Huawei et ses partenaires reçoivent le prix GSMA Global Mobile LATAM pour le projet Tech4Nature México visant à protéger les jaguars

Huawei et ses partenaires reçoivent le prix GSMA Global Mobile LATAM pour le projet Tech4Nature México visant à protéger les jaguars

May 14, 2026

Trending.

Pia Debuts Automation Hub, A Centralized Marketplace For MSPs: Exclusive

Pia Debuts Automation Hub, A Centralized Marketplace For MSPs: Exclusive

November 19, 2025
Veeam Debuts Data Resiliency Maturity Model To Assess, Improve Customers’ Cyber Resiliency

Veeam Debuts Data Resiliency Maturity Model To Assess, Improve Customers’ Cyber Resiliency

April 23, 2025
Microsoft Vs. AWS Vs. Google Cloud Earnings Q1 2025 Face-Off

Microsoft Vs. AWS Vs. Google Cloud Earnings Q1 2025 Face-Off

May 5, 2025
Many workers would take a pay cut to work from home — some would forgo at least 20% of their salary

Many workers would take a pay cut to work from home — some would forgo at least 20% of their salary

February 7, 2025
Insurance Modernization at Risk as Workforce Strategies Fall Behind, Says Info-Tech Research Group

Insurance Modernization at Risk as Workforce Strategies Fall Behind, Says Info-Tech Research Group

May 8, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio