Thursday, April 2, 2026
HomeTechnologyNew CrystalRAT malware provides RAT, stealer and prankware options

New CrystalRAT malware provides RAT, stealer and prankware options

New CrystalRAT malware provides RAT, stealer and prankware options

A brand new malware-as-a-service known as CrystalRAT is being promoted on Telegram, providing distant entry, knowledge theft, keylogging, and clipboard hijacking capabilities.

The malware emerged in January with a tiered subscription mannequin. Other than the Telegram channel, the MaaS was additionally promoted on YouTube by way of a devoted advertising channel that showcased its capabilities.

Kaspersky researchers say in a report at present that the malware options robust similarities to WebRAT (Salat Stealer), together with the identical panel design, Go-based code, and an analogous bot-based gross sales system.

CrystalX additionally consists of an in depth listing of prankware options designed to bother the person or disrupt their work. Regardless of its “enjoyable” aspect, CrystalX presents a big set of information theft capabilities.

Telegram channel promoting CrystaX RAT
Telegram channel selling CrystaX RAT
Supply: Kaspersky

CrystalX RAT particulars

Kaspersky says that the malware offers a user-friendly management panel and an automatic builder software that helps customization choices, together with geoblocking, executable customization, and anti-analysis options (anti-debugging, VM detection, proxy detection, and many others.).

The generated payloads are zlib-compressed and encrypted with the ChaCha20 symmetric stream cipher for cover.

The malware connects to the command-and-control (C2) by way of WebSocket and sends data concerning the host for profiling and an infection monitoring.

CrystalX’s infostealer part, which Kaspersky discovered to be quickly disabled as it’s being ready for an improve, targets Chromium-based browsers by way of the ChromeElevator software, Yandex, and Opera. Moreover, the software collects knowledge from desktop apps equivalent to Steam, Discord, and Telegram.

The distant entry module can be utilized to execute instructions by way of CMD, add/obtain recordsdata, browse the file system, and management the machine in actual time by way of built-in VNC.

The malware additionally displays spyware-like habits, as it could possibly seize video and audio from the microphone.

Lastly, CrystalX incorporates a keylogger that streams keystrokes in actual time to the C2, and a clipper software that makes use of common expressions to detect pockets addresses within the clipboard and change them with ones the attacker offers.

Remote desktop function in CrystalX RAT panel
Distant desktop perform in CrystalX RAT panel
Supply: Kaspersky

Including some “enjoyable” to the combo

What units CrystalX aside within the crowded MaaS house is its wealthy set of prankware options.

In keeping with Kaspersky, the malware can do the next on contaminated units:

  • change desktop wallpaper
  • alter show orientation to varied angles
  • drive system shutdown
  • remap mouse buttons
  • disable enter units (keyboard/mouse/monitor)
  • present pretend notifications
  • change the cursor place on the display screen
  • cover numerous elements (desktop icons, taskbar, the Activity Supervisor, and the Command Immediate executable)
  • present an attacker-victim chat window

Whereas the above options don’t enhance the assault’s monetization potential for cybercriminals, they definitely make the product distinctive and will bait script kiddies and low-skilled/entry-level menace actors into getting a subscription.

One more reason for the prank options may very well be potential for sufferer manipulation, and even distraction, whereas the info theft modules run within the background.

To scale back the chance of malware infections, customers are suggested to train warning when interacting with on-line content material and keep away from downloading software program or media from untrusted or unofficial sources.

Automated pentesting proves the trail exists. BAS proves whether or not your controls cease it. Most groups run one with out the opposite.

This whitepaper maps six validation surfaces, exhibits the place protection ends, and offers practitioners with three diagnostic questions for any software analysis.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments