微软揭露新型恶意软件StilachiRAT
微软披露了一种名为StilachiRAT的远程访问木马,该恶意软件可窃取敏感数据并具备持久性和规避能力。它通过伪装软件、恶意网站或钓鱼邮件传播,并可监控系统活动和加密货币钱包信息。 2025-3-19 09:59:7 Author: www.securityweek.com(查看原文) 阅读量:12 收藏

Microsoft this week shared details on StilachiRAT, an evasive and persistent piece of malware that enables cybercriminals to steal sensitive data from compromised systems.

The tech giant’s incident response team first spotted StilachiRAT (the name was given by Microsoft) in November 2024. While it currently does not appear to be widely distributed, the company wanted to warn users and organizations.

Microsoft has yet to link StilachiRAT, which has been described as a remote access trojan (RAT), to any known threat group or a specific country.

The company has not specified how the RAT is being distributed, but noted that such threats can be installed through multiple attack vectors, including trojanized software, malicious websites, and email. 

Once it has been deployed on a device, the malware collects information about the system to enable a detailed profiling. StilachiRAT then scans the system for configuration data associated with 20 different cryptocurrency wallet Chrome extensions. 

The RAT extracts usernames and passwords stored in Chrome and continuously monitors clipboard content for valuable information such as credentials and cryptocurrency keys.

The malware can also monitor RDP sessions, which could allow the attacker to move laterally within the compromised network. 

According to Microsoft, StilachiRAT can execute various commands, including to reboot the system, clear logs, manipulate registry entries, and execute applications. 

Advertisement. Scroll to continue reading.

For persistence the malware uses the Windows service control manager and watchdog threads to ensure that it’s restored in case of removal. 

The RAT also packs anti-forensic and evasion capabilities. 

“StilachiRAT displays anti-forensic behavior by clearing event logs and checking certain system conditions to evade detection. This includes looping checks for analysis tools and sandbox timers that prevent its full activation in virtual environments commonly used for malware analysis,” Microsoft explained.

“Additionally, Windows API calls are obfuscated in multiple ways and a custom algorithm is used to encode many text strings and values. This significantly slows down analysis time since extrapolating higher level logic and code design becomes a more complex effort,” it added. “The malware employs API-level obfuscation techniques to impede manual analysis, specifically by concealing its use of Windows APIs.”

Related: 11 State-Sponsored APTs Exploiting LNK Files for Espionage, Data Theft

Related: ClickFix Widely Adopted by Cybercriminals, APT Groups

Related: DeepSeek’s Malware-Generation Capabilities Put to Test


文章来源: https://www.securityweek.com/microsoft-warns-of-new-stilachirat-malware/
如有侵权请联系:admin#unsafe.sh