
A new and highly sophisticated remote access trojan (RAT), called StilachiRAT, poses significant threats to organizations and individual users due to its advanced evasion techniques, persistent mechanisms, and capabilities for stealing sensitive data.
Microsoft Incident Response has identified that StilachiRAT utilizes multiple methods to infiltrate and exploit its targets, as detailed in an extensive security analysis.Â
It displays persistence mechanisms by leveraging Windows service control manager (SCM) and watchdog threads, enabling malware reinstatement if removed, and anti-forensics and detection evasion via sandbox-evading techniques, log clearing, and API obfuscation methods to avoid identification.
The malware conducts extensive system reconnaissance by collecting operating system details, hardware identifiers, and information about running applications and active RDP sessions. Â
The RAT actively scans clipboard content, searching for sensitive information like passwords and cryptocurrency keys to exfiltrate, and extracts and decrypts saved credentials from Google Chrome’s password vault using Windows APIs that leverage the current user’s authentication context.
One of StilachiRAT's standout features is its targeted attack on cryptocurrency wallets managed via browser extensions. Its ability to scan configuration data and clipboard activity tied to cryptocurrency keys increases the risk of significant financial theft.Â
It specifically targets over 20 cryptocurrency wallet extensions in Google Chrome – associated with the Tron Cryptocurrency blockchain that is popular in Asia, especially in China – enabling the theft of configuration data and private keys.Â
It can also communicate with remote command-and-control (C2) servers to execute commands, such as system reboots, log clearing, registry manipulations, and application executions.Â
In another case last year, a new RAT infected Android devices via smishing, aiming for Account Takeover (ATO) via a well-known technique called On Device Fraud (ODF).