Microsoft warns of a devious new RAT malware which can avoid detection with apparent ease
StilachiRAT has slowly wormed its way into systems worldwide

- Microsoft is warning about a brand new RAT called Stilachi
- It is good at hiding and persisting, while stealing sensitive data
- StilachiRAT allows threat actors to run commands on endpoints, too
A new Remote Access Trojan (RAT) has been spotted using “sophisticated techniques” to hide and persist while it steals people’s sensitive information, experts have warned.
Researchers at Microsoft said the malware is still too “young” to be attributed to any specific actor, or threat campaign.
"In November 2024, Microsoft Incident Response researchers uncovered a novel remote access trojan (RAT) we named StilachiRAT that demonstrates sophisticated techniques to evade detection, persist in the target environment, and exfiltrate sensitive data," Microsoft said.
Crypto in the crosshairs
The company did not explain how the RAT is distributed, but once it’s installed on a device, it maintains persistence through the Windows service control manager (SCM). It uses watchdog threats to track the malware’s binaries and recreate them if they’re removed, essentially reinstalling the malware if necessary.
As for evasion and anti-forensics, it can clear event logs, and look for signs that it’s running in a sandbox environment. If you even trick it to run in a sandbox, its Windows API calls are still encoded as “checksums that are resolved dynamically at runtime,” which makes analysis that much harder.
For features, StilachiRAT doesn’t stray much from your usual Remote Access Trojan. It targets credentials stored in the browser, digital wallet information, data stored in the clipboard, and system information (hardware identifiers, camera presence, active Remote Desktop Protocol (RDP) sessions, and running GUI-based applications to profile targeted systems).
StilachiRAT is particularly interested in cryptocurrency wallets. It can scan the configuration info of 20 wallet extensions such as Phantom, MetaMask, Trust Wallet, and many others.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
But the tool can do much more than “just” steal data - it allows for remote command execution, granting the attackers the ability to restart the device, run applications, and more. There are even commands built to "suspend the system, modify Windows registry values, and enumerate open windows."
Via BleepingComputer
You might also like
- Cybercriminals are using virtual hard drives to drop RATs in phishing attacks
- We've rounded up the best password managers
- Take a look at our guide to the best authenticator app
Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.
You must confirm your public display name before commenting
Please logout and then login again, you will then be prompted to enter your display name.

















