New StilachiRAT employs advanced techniques to evade detection and steal data

New StilachiRAT employs advanced techniques to evade detection and steal data

Microsoft Incident Response researchers discovered StilachiRAT, a sophisticated remote access trojan (RAT) designed to evade detection, maintain persistence, and exfiltrate sensitive data. The malware targets various data, including browser credentials, digital wallet details, clipboard contents, and system data, using the WWStartupCtrl64.dll module.

Microsoft has yet to attribute the RAT to a specific threat actor. StilachiRAT gathers detailed system information, including OS data, device identifiers, and BIOS serial numbers, and uses WMI Query Language to collect this information. It specifically targets Google Chrome’s cryptocurrency wallet extensions and decrypts Chrome's master encryption key to access stored credentials.

StilachiRAT can operate as both a Windows service and standalone component, employing watchdog mechanisms to ensure persistence. It also monitors RDP sessions, impersonates users by duplicating security tokens, and can launch applications with elevated privileges. The malware tracks user activity by monitoring GUI windows, installed software, and clipboard data, sending this information to its command-and-control (C2) server.

To avoid detection, StilachiRAT employs anti-forensic techniques, such as clearing event logs and detecting sandbox environments. It is capable of executing a wide range of commands, including credential theft, system manipulation, and espionage.

Back to the list

Latest Posts

Cyber Security Week in Review: April 25, 2025

Cyber Security Week in Review: April 25, 2025

In brief: A SAP NetWeaver zero-day bug exploited in the wild, DslogdRAT exploits a recent Ivanti flaw, and more.
25 April 2025
ToyMaker: Financially-motivated IAB that sells access to ransomware gangs

ToyMaker: Financially-motivated IAB that sells access to ransomware gangs

ToyMaker is believed to be behind the custom backdoor dubbed ‘LAGTOY.’
24 April 2025
DragonForce and Anubis ransomware ops use novel models to attract affiliates and boost profits

DragonForce and Anubis ransomware ops use novel models to attract affiliates and boost profits

DragonForce introduced a distributed affiliate branding model.
23 April 2025