In November 2024, Microsoft Incident Response researchers uncovered a novel distant entry trojan (RAT) we named StilachiRAT that demonstrates refined methods to evade detection, persist within the goal setting, and exfiltrate delicate knowledge. Evaluation of the StilachiRAT’s WWStartupCtrl64.dll module that incorporates the RAT capabilities revealed using varied strategies to steal data from the goal system, equivalent to credentials saved within the browser, digital pockets data, knowledge saved within the clipboard, in addition to system data.
Microsoft has not but attributed StilachiRAT to a particular menace actor or geolocation. Primarily based on Microsoft’s present visibility, the malware doesn’t exhibit widespread distribution presently. Nonetheless, due to its stealth capabilities and the fast modifications throughout the malware ecosystem, we’re sharing these findings as a part of our ongoing efforts to monitor, analyze, and report on the evolving menace panorama.
Microsoft safety options can detect actions associated to assaults that use StilachiRAT. To assist defenders defend their community, we’re additionally sharing mitigation steering to assist cut back the affect of this menace, detection particulars, and looking queries. Microsoft continues to monitor data on the supply vector utilized in these assaults. Malware like StilachiRAT will be put in by way of a number of vectors; due to this fact, it’s important to implement safety hardening measures to stop the preliminary compromise.
This weblog presents our detailed findings on all the important thing capabilities of StilachiRAT, which embody:
- System reconnaissance: Collects complete system data, together with working system (OS) particulars, {hardware} identifiers, digital camera presence, energetic Distant Desktop Protocol (RDP) periods, and working graphical person interface (GUI) purposes, permitting detailed profiling of the goal system.
- Digital pockets concentrating on: Scans for configuration knowledge of 20 totally different cryptocurrency pockets extensions for the Google Chrome browser.
- Credential theft: Extracts and decrypts saved credentials from Google Chrome, gaining entry to usernames and passwords saved within the browser.
- Command-and-control (C2) connectivity: Establishes communication with distant C2 servers utilizing TCP ports 53, 443, or 16000, enabling distant command execution and doubtlessly SOCKS like proxying.
- Command execution: Helps a wide range of instructions from the C2 server, together with system reboots, log clearing, registry manipulation, software execution, and system suspension.
- Persistence mechanisms: Achieves persistence by way of the Windows service control manager (SCM) and makes use of watchdog threads to guarantee self-reinstatement if eliminated.
- RDP monitoring: Displays RDP periods, capturing energetic window data and impersonating customers, permitting for potential lateral motion inside networks.
- Clipboard and knowledge assortment: Repeatedly displays clipboard content material, actively trying to find delicate knowledge like passwords and cryptocurrency keys, whereas monitoring energetic home windows and purposes.
- Anti-forensics and evasion: Employs anti-forensic techniques by clearing occasion logs, detecting evaluation instruments, and implementing sandbox-evading behaviors to keep away from detection.
Technical evaluation of key capabilities
System reconnaissance
StilachiRAT gathers intensive system data, together with OS particulars, machine identifiers, BIOS serial numbers, and digital camera presence. Info is collected by way of the Part Object Mannequin (COM) Net-based Enterprise Administration (WBEM) interfaces utilizing WMI Question Language (WQL). Beneath are a number of the queries it executes:
Serial quantity

Digicam

OS / System data (server, mannequin, producer)

Moreover, the malware creates a singular identification on the contaminated machine that’s derived from the system’s serial quantity and attackers’ public RSA key. The knowledge is saved within the registry beneath a CLSID key.

Digital pockets concentrating on
StilachiRAT targets an inventory of particular cryptocurrency pockets extensions for the Google Chrome browser. It accesses the settings within the following registry key and validates if any of the extensions are put in:
SOFTWAREGoogleChromePreferenceMACsDefaultextensions.settings
The malware targets the next cryptocurrency pockets extensions:
Cryptocurrency pockets extension title | Chrome extension identifier |
Bitget Pockets (Previously BitKeep) | jiidiaalihmmhddjgbnbgdfflelocpak |
Belief Pockets | egjidjbpglichdcondbcbdnbeeppgdph |
TronLink | ibnejdfjmmkpcnlpebklmnkoeoihofec |
MetaMask (ethereum) | nkbihfbeogaeaoehlefnkodbefgpgknn |
TokenPocket | mfgccjchihfkkindfppnaooecgfneiii |
BNB Chain Pockets | fhbohimaelbohpjbbldcngcnapndodjp |
OKX Pockets | mcohilncbfahbmgdjkbpemcciiolgcge |
Sui Pockets | opcgpfmipidbgpenhmajoajpbobppdil |
Braavos – Starknet Pockets | jnlgamecbpmbajjfhmmmlhejkemejdma |
Coinbase Pockets | hnfanknocfeofbddgcijnmhnfnkdnaad |
Leap Cosmos Pockets | fcfcfllfndlomdhbehjjcoimbgofdncg |
Manta Pockets | enabgbdfcbaehmbigakijjabdpdnimlg |
Keplr | dmkamcknogkgcdfhhbddcghachkejeap |
Phantom | bfnaelmomeimhlpmgjnjophhpkkoljpa |
Compass Pockets for Sei | anokgmphncpekkhclmingpimjmcooifb |
Math Pockets | afbcbjpbpfadlkmhmclhkeeodmamcflc |
Fractal Pockets | agechnindjilpccclelhlbjphbgnobpf |
Station Pockets | aiifbnbfobpmeekipheeijimdpnlpgpp |
ConfluxPortal | bjiiiblnpkonoiegdlifcciokocjbhkd |
Plug | cfbfdhimifdmdehjmkdobpcjfefblkjm |
Credential theft
StilachiRAT extracts Google Chrome’s encryption_key from the native state file in a person’s listing. Nonetheless, since the bottom line is encrypted when Chrome is first put in, it makes use of Home windows APIs that depend on present person’s context to decrypt the grasp key. This permits entry to the saved credentials within the password vault. The saved credentials are extracted from the next places:
- %LOCALAPPDATApercentGoogleChromeUser DataLocal State – shops Chrome’s configuration knowledge, together with the encrypted key.
- %LOCALAPPDATApercentGoogleChromeUser DataDefaultLogin Information – shops entered person credentials.
The “Login Information” shops data utilizing an SQLite database and the malware retrieves credentials utilizing the next question:

Command-and-control (C2)
There are two configured addresses for the C2 server – one is saved in obfuscated type and the opposite is an IP handle transformed to its binary format (as an alternative of a daily string):
- app.95560[.]cc
- 194.195.89[.]47
The communications channel is established utilizing TCP ports 53, 443, or 16000, chosen randomly. Moreover, the malware checks for presence of tcpview.exe and won’t proceed if one is current. It additionally delays preliminary connection by two hours, presumably to evade detection. As soon as linked, an inventory of energetic home windows is distributed to the server. Extra technical findings concerning C2 communications performance are listed within the part beneath.

Persistence mechanisms
StilachiRAT will be launched each as a Home windows service or a standalone element. In each circumstances, there’s a mechanism in place to make sure the malware isn’t eliminated.
A watchdog thread displays each the EXE and dynamic hyperlink library (DLL) information utilized by the malware by periodically polling for his or her presence. If discovered absent, the information will be recreated from an inside copy obtained throughout initialization. Lastly, the Home windows service element will be recreated by modifying the related registry settings and restarting it by way of the SCM.


RDP monitoring
StilachiRAT displays RDP periods by capturing foreground window data and duplicating safety tokens to impersonate customers. That is significantly dangerous on RDP servers internet hosting administrative periods because it may allow lateral motion inside networks.
The malware obtains the present session and actively launches foreground home windows in addition to enumerates all different RDP periods. For every recognized session, it’s going to entry the Home windows Explorer shell and duplicate its privileges or safety token. The malware then positive factors capabilities to launch purposes with these newly obtained privileges.


Information assortment
StilachiRAT collects a wide range of person knowledge, together with software program set up data and energetic purposes. It displays energetic GUI home windows, their title bar textual content, and file location, and sends this data to the C2 server, doubtlessly permitting attackers to monitor person conduct.


Clipboard monitoring
StilachiRAT has a performance that’s answerable for monitoring clipboard knowledge. Particularly, the malware can periodically learn the clipboard, extract textual content based mostly on search expressions, after which exfiltrate this knowledge. Clipboard monitoring is steady, with focused searches for delicate data equivalent to passwords, cryptocurrency keys, and doubtlessly private identifiers.
The record beneath contains the common search expressions used to extract sure credentials. These are related to the Tron Cryptocurrency blockchain that’s in style in Asia, particularly in China.
Credential | Common expression to extract credential |
TRX Handle | `bT[0-9a-zA-Z]{33}b` |
TRX Key | `b(0x)?[0-9a-fA-F]{64}b` |
TRX Go | `^s*b([0-9]*[.]*[a-wy-z][a-z]{2,}[ t]*b){12}s*(n$)` |
TRX Go | `^s*b([0-9]*[.]*?[a-wy-z][a-z]{2,}s*b){12}s*(n$)` |


The identical search expressions are then used to iterate information within the following places:
- %USERPROFILEpercentDesktop
- %USERPROFILEpercentRecent

Anti-forensic measures
StilachiRAT shows anti-forensic conduct by clearing occasion logs and checking sure system situations to evade detection. This contains looping checks for evaluation instruments and sandbox timers that stop its full activation in digital environments generally used for malware evaluation.
Moreover, Home windows API calls are obfuscated in a number of methods and a customized algorithm is used to encode many textual content strings and values. This considerably slows down evaluation time since extrapolating larger stage logic and code design turns into a extra complicated effort.
The malware employs API-level obfuscation methods to impede guide evaluation, particularly by concealing its use of Home windows APIs (e.g., RegOpenKey()). As a substitute of referencing API names immediately, it encodes them as checksums which might be resolved dynamically at runtime. Whereas this can be a widespread method in malware, the authors have launched extra layers of obfuscation.
Precomputed API checksums are saved in a number of lookup tables, every masked with an XOR worth. Throughout launch, the malware selects the suitable desk based mostly on the hashed API title, applies the right XOR masks to decode the worth, and dynamically resolves the corresponding Home windows API perform. The resolved perform pointer is then cached, however with a further XOR masks utilized, stopping simple reminiscence scans from figuring out API references.


Instructions launched from the C2 server
StilachiRAT can launch varied instructions acquired from the C2 server. These instructions embody system reboot, log clearing, credential theft, executing purposes, and manipulating system home windows. Moreover, it could droop the system, modify Home windows registry values, and enumerate open home windows, indicating a flexible command set for each espionage and system manipulation. The C2 server’s command construction assigns particular numbers to what instructions it’s going to provoke. The next part presents particulars on the stated instructions.
07 – Dialog field
Makes use of the Home windows API perform ShowHTMLDialogEx() to show a dialog field with rendered HTML contents from a provided URL.

08 – Log clearing
Given an occasion log kind, the related Home windows APIs are used to open after which clear the log entries.

09 – System reboot
Adjusts its personal executing privileges to allow system shutdown and makes use of an undocumented Home windows API to carry out the motion.

13 – Community sockets
Seems to comprise functionality to obtain a community handle from C2 server and set up a brand new outbound connection.
14 – TCP incoming
Accepts an incoming community connection on the provided TCP port.
15 – Terminate
If there’s an open community connection, then shut it and disable the Home windows service controlling this course of. This seems to be the self-removal (uninstall) command.
16 – Provoke software
The malware creates a console window and initiates a command to launch this system offered by the C2 operator utilizing the WinExec() API.

19 – Enumerate Home windows
Iterates all home windows of the present desktop to search for a requested title bar textual content. This may enable the operator to entry particular GUI purposes and their contents, each onscreen and clipboard.
26 – Droop
Makes use of the SetSuspendState() API to put the system into both a suspended (sleep) state or hibernation.
30 – Chrome credentials
Launches the sooner talked about performance to steal Google Chrome passwords.
Mitigations
Malware like StilachiRAT will be put in by way of varied vectors. The next mitigations may also help stop the sort of malware from infiltrating the system and cut back the assault floor:
- In some circumstances, RATs can masquerade as legit software program or software program updates. All the time obtain software program from the official web site of the software program developer or from respected sources.
- Encourage customers to use Microsoft Edge and different net browsers that help SmartScreen, which identifies and blocks malicious web sites, together with phishing websites, rip-off websites, and websites that host malware.
- Activate Safe Links and Safe Attachments for Workplace 365. In organizations with Microsoft Defender for Workplace 365, Protected Hyperlinks scanning protects your group from malicious hyperlinks which might be utilized in phishing and different assaults. Particularly, Protected Hyperlinks offers URL scanning and rewriting of inbound electronic mail messages throughout mail circulation, and time-of-click verification of URLs and hyperlinks in electronic mail messages, Microsoft Groups, and supported Workplace 365 apps. Protected Attachments offers a further layer of safety for electronic mail attachments which have already been scanned by anti-malware protection in Exchange Online Protection (EOP).
- Allow network protection in Microsoft Defender for Endpoint to stop purposes or customers from accessing malicious domains and different malicious content material on the web. You’ll be able to audit network protection in a check setting to view which apps could be blocked earlier than enabling community safety.
Basic hardening tips:
- Be sure that tamper protection is enabled in Microsoft Dender for Endpoint.
- Run endpoint detection and response in block mode in order that Microsoft Defender for Endpoint can block malicious artifacts, even when your non-Microsoft antivirus doesn’t detect the menace or when Microsoft Defender Antivirus is working in passive mode.
- Configure investigation and remediation in full automated mode to let Microsoft Defender for Endpoint take speedy motion on alerts to resolve breaches, considerably lowering alert quantity.
- Turn on Potentially unwanted applications (PUA) protection in block mode in Microsoft Defender Antivirus. PUA are a class of software program that may trigger your machine to run slowly, show sudden adverts, or set up different software program that could be sudden or unapproved.
- Activate cloud-delivered protection in Microsoft Defender Antivirus or the equal on your antivirus product to cowl quickly evolving attacker instruments and methods.
- Activate Microsoft Defender Antivirus real-time protection.
Microsoft Defender XDR detections
Microsoft Defender XDR clients can refer to the record of relevant detections beneath. Microsoft Defender XDR coordinates detection, prevention, investigation, and response throughout endpoints, identities, electronic mail, apps to present built-in safety towards assaults just like the menace mentioned on this weblog.
Clients with provisioned entry may use Microsoft Security Copilot in Microsoft Defender to examine and reply to incidents, hunt for threats, and defend their group with related menace intelligence.
Microsoft Defender Antivirus
Microsoft Defender Antivirus detects this menace as the next malware:
- TrojanSpy:Win64/Stilachi.A
Microsoft Defender for Endpoint
The next alerts may point out menace exercise associated to this menace. Be aware, nevertheless, that these alerts will be additionally triggered by unrelated menace exercise.
- A course of was injected with doubtlessly malicious code
- Course of hollowing detected
- Suspicious service launched
- Potential theft of passwords and different delicate net browser data
Microsoft Safety Copilot
Safety Copilot clients can use the standalone expertise to create their own prompts or run the next pre-built promptbooks to automate incident response or investigation duties associated to this menace:
- Incident investigation
- Microsoft Person evaluation
- Risk actor profile
- Risk Intelligence 360 report based mostly on MDTI article
- Vulnerability affect evaluation
Be aware that some promptbooks require entry to plugins for Microsoft merchandise equivalent to Microsoft Defender XDR or Microsoft Sentinel.
Looking queries
Microsoft Defender XDR
Microsoft Defender XDR clients can run the next question to discover associated exercise of their networks:
Search for suspicious outbound community connections
Monitor community visitors for malicious exercise attributable to distant entry trojans by specializing in figuring out uncommon outbound connections, irregular port exercise, and suspicious knowledge exfiltration patterns which will point out RAT presence.
Outbound ports related to widespread knowledge switch protocols equivalent to HTTP/HTTPS (port 80/443), SMB (port 445), and DNS (port 53) or much less widespread ports like 16000 used for particular purposes and companies for community communications may point out such exercise.
let domains = dynamic(['domain1', 'domain2', 'domain3']);
DeviceNetworkEvents
| the place RemotePort in (53, 443, 16000)
| the place Protocol == "Tcp"
| the place RemoteUrl has_any (domains)
| mission Timestamp, DeviceName, RemoteIP, RemotePort, InitiatingProcessCommandLine, ActionType, DeviceId, LocalIP, RemoteUrl, InitiatingProcessFileName
Search for indicators of persistence
The malware will be run each as a Home windows Service or a standalone element. To determine persistence and suspicious companies, monitor for the next occasion IDs:
- Occasion ID 7045 – a brand new service was put in on the system. Monitor for suspicious companies.
- Occasion ID 7040 – begin kind of a service is modified (boot, on-request). Boot could also be a vector for the RAT to persist throughout a system reboot. On request signifies that the method should request the SCM to begin the service.
- Correlated with Occasion ID 4697 – a service was put in on the system (Safety log)
DeviceEvents
|the place ActionType == “ServiceInstalled”
| mission Timestamp, DeviceId,ActionType, FileName, FolderPath, InitiatingProcessCommandLine
Search for anti-forensic conduct
To determine potential occasion log clearing, monitor for the next occasion IDs:
- Occasion ID 1102 (Safety log)
- Occasion ID 104 (System log)
Microsoft Sentinel
Microsoft Sentinel clients can use the TI Mapping analytics (a collection of analytics all prefixed with ‘TI map’) to mechanically match the malicious area/IP/Hash indicators talked about on this weblog put up with knowledge of their workspace. If the TI Map analytics are usually not presently deployed, clients can set up the Risk Intelligence answer from the Microsoft Sentinel Content Hub to have the analytics rule deployed of their Sentinel workspace.
Moreover, Sentinel customers can use the next question to detect when the safety occasion log has been cleared, a possible indicator of an try to erase system proof.
SecurityEvent
| the place EventID == 1102 and EventSourceName == "Microsoft-Home windows-Eventlog"
| summarize StartTimeUtc = min(TimeGenerated), EndTimeUtc = max(TimeGenerated), EventCount = depend() by Pc, Account, EventID, Exercise
| prolong HostName = tostring(break up(Pc, ".")[0]), DomainIndex = toint(indexof(Pc, '.'))
| prolong HostNameDomain = iff(DomainIndex != -1, substring(Pc, DomainIndex + 1), Pc)
| prolong AccountName = tostring(break up(Account, @'')[1]), AccountNTDomain = tostring(break up(Account, @'')[0])
Sentinel customers may use the next question to detect service installations or modifications in service settings, which can point out potential persistence mechanisms utilized by attackers.
Occasion
// 7045: A service was put in within the system
// 7040: A service setting has been modified
| the place Supply == "Service Management Supervisor"
| the place EventID in ( '7045', '7040')
| parse EventData with * 'ServiceName">' ServiceName "<" * 'ImagePath">' ImagePath "<" *
| parse EventData with * 'AccountName">' AccountName "<" *
| summarize StartTime = min(TimeGenerated), EndTime = max(TimeGenerated) by EventID, Pc, ServiceName, ImagePath, AccountName
Indicators of compromise
Indicator | Kind | Description |
394743dd67eb018b02e069e915f64417bc1cd8b33e139b92240a8cf45ce10fcb | SHA-256 | WWStartupCtrl64.dll |
194.195.89[.]47 | IP handle | C2 |
app.95560[.]cc | Area title | C2 |
Be taught extra
For the newest safety analysis from the Microsoft Risk Intelligence group, try the Microsoft Risk Intelligence Weblog: https://aka.ms/threatintelblog.
To get notified about new publications and to be part of discussions on social media, comply with us on LinkedIn at https://www.linkedin.com/showcase/microsoft-threat-intelligence, and on X (previously Twitter) at https://x.com/MsftSecIntel.
To listen to tales and insights from the Microsoft Risk Intelligence group concerning the ever-evolving menace panorama, hear to the Microsoft Risk Intelligence podcast: https://thecyberwire.com/podcasts/microsoft-threat-intelligence.
Microsoft is dedicated to delivering complete buyer expertise by way of varied Microsoft Choices. Our method goes past conventional help by specializing in detection, prevention, and in-depth mitigation to assist clients rapidly reply to safety incidents and construct resiliency. Need to understand how to Construct a Extra Safe Tomorrow? Examine our Unified and Security eBook and go to https://aka.ms/Unified
Dmitriy Pletnev and Daria Pop
Microsoft Incident Response