Microsoft identifies new RAT targeting cryptocurrency wallets and more
微软发现新型远程访问木马StilachiRAT,可窃取Chrome加密货币钱包扩展配置文件及凭证,并监控剪贴板和活动窗口以收集敏感数据。该恶意软件采用高级隐蔽技术删除日志并规避检测。其功能包括系统重启、日志清除、凭证窃取及系统操纵等。目前尚未追踪到具体攻击者或地区。 2025-3-18 17:31:27 Author: therecord.media(查看原文) 阅读量:27 收藏

Microsoft has identified a previously unknown remote access trojan, dubbed StilachiRAT, that employs advanced techniques to evade detection and maintain persistence on infected systems.

The malware is designed to exfiltrate a wide range of sensitive data, including configuration files from 20 cryptocurrency wallet extensions for the Google Chrome browser. Among the targeted wallets are MetaMask, Coinbase Wallet, Trust Wallet, and TronLink. 

StilachiRAT can also extract and decrypt saved credentials from Chrome, giving attackers access to stored usernames and passwords, Microsoft said.

Beyond stealing credentials, the malware gathers extensive system information, monitors clipboard activity for sensitive data such as passwords and cryptocurrency keys, and tracks active windows and applications, the report said.

To avoid detection, StilachiRAT deletes system logs and checks the computer’s settings before executing its commands.

Microsoft has not traced the malware to any known threat actor or geographic region, and its distribution appears to be limited at this stage. However, researchers decided to share their findings due to the malware's stealthiness and its ability to collect a wide range of data.

StilachiRAT can execute a variety of commands received from its command-and-control (C2) server. These include rebooting the system, clearing logs, stealing credentials, launching applications, and manipulating system windows.

The malware can also suspend the system and modify Windows registry settings, highlighting its potential for both espionage and system manipulation, Microsoft said.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.


文章来源: https://therecord.media/stilachirat-new-remote-access-trojan-crypto-wallets
如有侵权请联系:admin#unsafe.sh