Cybercriminals are constantly finding new ways to launch attacks, and this time they're going after cryptocurrency users. Microsoft has recently discovered a new Remote Access Trojan (RAT) called StilachiRAT. This malware is designed to spy on victims, steal confidential information, and even drain cryptocurrency wallets without the user noticing.
What makes StilachiRAT particularly dangerous is its sophisticated techniques that help it evade detection, remain active on infected systems, and extract valuable data. Although its distribution is currently limited and hasn't yet been linked to a specific threat actor, Microsoft decided to publicly share key information about this malware to help individuals and organizations detect and mitigate the threat before it spreads further.
In this article, we’ll explain what StilachiRAT is, how it works, and most importantly, how you can protect yourself. If you manage cryptocurrency or store sensitive data on your computer, you’ll want to keep reading.
StilachiRAT is more than just a data thief — it’s equipped with advanced capabilities that allow attackers to spy on systems, steal sensitive data, and maintain persistent access. Here’s how it operates:
Once installed on a compromised system, StilachiRAT scans for valuable information such as:
The malware can identify and extract data from 20 different cryptocurrency wallet extensions, including Coinbase Wallet, Phantom, Trust Wallet, MetaMask, OKX Wallet, Bitget Wallet, and more.
StilachiRAT can monitor active Remote Desktop Protocol (RDP) sessions by capturing details from foreground windows and cloning security tokens to impersonate logged-in users.
This allows attackers to move laterally across a network, especially if they manage to infect RDP servers that often host administrative sessions. The malware identifies active sessions, opens foreground windows, and lists all other active RDP connections. It then accesses the Windows Explorer shell to duplicate session privileges or security tokens, giving attackers the ability to run applications with elevated permissions.
StilachiRAT uses advanced evasion tactics to remain undetected. It can:
StilachiRAT connects to a Command and Control (C2) server, allowing attackers to remotely control infected devices. Through this connection, they can:
Additional commands allow attackers to suspend the system, modify Windows registry values, and list active windows, giving them extensive control over the infected device.
Read more: What is a Cyberattack?
Since StilachiRAT uses sophisticated techniques to infiltrate systems and steal data, protecting yourself requires proactive security measures. Here’s what you can do:
StilachiRAT is a serious threat that combines powerful data theft techniques with sophisticated evasion strategies. By staying informed and following security best practices, you can reduce the risk of falling victim to this malware.
If you manage cryptocurrencies or store sensitive data on your computer, taking preventive steps now can save you from potential losses later. Stay vigilant, update your security tools, and be cautious with the software you install.