New CrystalRAT malware adds RAT, stealer and prankware features
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户的要求是直接写文章描述,不需要用“文章内容总结”之类的开头。 首先,我得仔细阅读文章内容。文章讲的是一个新的恶意软件即服务(MaaS)叫做CrystalRAT,在Telegram上推广。它有远程访问、数据窃取、键盘记录和剪贴板劫持等功能。这个恶意软件于一月份出现,采用分层订阅模式,并且在YouTube上也有推广渠道。 Kaspersky的研究人员指出,CrystalRAT与WebRAT有很多相似之处,包括面板设计、基于Go的代码以及类似的销售系统。此外,CrystalX还包含大量恶作剧功能,比如改变桌面壁纸、旋转屏幕、强制关机等,这些功能虽然不影响数据窃取的获利能力,但让产品更具特色,吸引了一些低技能的攻击者。 总结的时候需要涵盖以下几个要点:CrystalRAT的功能、它的推广渠道、与WebRAT的相似性、恶作剧功能以及数据窃取能力。同时要保持在100字以内。 接下来,我需要把这些信息浓缩成一句话或几句话。确保涵盖主要功能和独特之处。 可能的结构是:介绍CrystalRAT及其功能和推广方式;提到其与WebRAT的相似性;强调恶作剧功能和数据窃取能力。 最后检查字数是否符合要求,并确保表达清晰简洁。 </think> 一种名为CrystalRAT的新恶意软件即服务(MaaS)在Telegram上推广,提供远程访问、数据窃取、键盘记录和剪贴板劫持等功能。该恶意软件于一月份推出,采用分层订阅模式,并通过YouTube进行宣传。其功能与WebRAT相似,并包含大量恶作剧功能以吸引低技能攻击者。 2026-4-1 23:30:17 Author: www.bleepingcomputer.com(查看原文) 阅读量:5 收藏

New CrystalRAT malware adds RAT, stealer and prankware features

A new malware-as-a-service called CrystalRAT is being promoted on Telegram, offering remote access, data theft, keylogging, and clipboard hijacking capabilities.

The malware emerged in January with a tiered subscription model. Apart from the Telegram channel, the MaaS was also promoted on YouTube, via a dedicated marketing channel that showcased its capabilities.

Kaspersky researchers say in a report today that the malware features strong similarities to WebRAT (Salat Stealer), including the same panel design, Go-based code, and a similar bot-based sales system.

CrystalX also includes an extensive list of prankware features designed to annoy the user or disrupt their work. Despite its "fun" side, CrystalX offers a large set of data theft capabilities.

Telegram channel promoting CrystaX RAT
Telegram channel promoting CrystaX RAT
Source: Kaspersky

CrystalX RAT details

Kaspersky says that the malware provides a user-friendly control panel and an automated builder tool that supports customization options, including geoblocking, executable customization, and anti-analysis features (anti-debugging, VM detection, proxy detection, etc.).

The generated payloads are zlib-compressed and encrypted with the ChaCha20 symmetric stream cipher for protection.

The malware connects to the command-and-control (C2) via WebSocket and sends info about the host for profiling and infection tracking.

CrystalX’s infostealer component, which Kaspersky found to be temporarily disabled as it is being prepared for an upgrade, targets Chromium-based browsers via the ChromeElevator tool, Yandex, and Opera. Additionally, the tool collects data from desktop apps such as Steam, Discord, and Telegram.

The remote access module can be used to execute commands via CMD, upload/download files, browse the file system, and control the machine in real time via built-in VNC.

The malware also exhibits spyware-like behavior, as it can capture video and audio from the microphone.

Finally, CrystalX features a keylogger that streams keystrokes in real time to the C2, and a clipper tool that uses regular expressions to detect wallet addresses in the clipboard and replace them with ones the attacker provides.

Remote desktop function in CrystalX RAT panel
Remote desktop function in CrystalX RAT panel
Source: Kaspersky

Putting some “fun” in the package

What sets CrystalX apart in the crowded MaaS space is its rich set of prankware features.

According to Kaspersky, the malware can do the following on infected devices:

  • change desktop wallpaper
  • alter display orientation to various angles
  • force system shutdown
  • remap mouse buttons
  • disable input devices (keyboard/mouse/monitor)
  • show fake notifications
  • change cursor position on the screen
  • hide various components (desktop icons, taskbar, the Task Manager, and the Command Prompt executable)
  • Provide attacker-victim chat window

While the above features do not improve the attack’s monetization potential for cybercriminals, they certainly make the product distinctive, and could bait script kiddies and low-skilled/entry-level threat actors into getting a subscription.

Another reason for the prank features could be potential for victim manipulation, or even distraction, while the data theft modules run in the background.

To reduce the risk of malware infections, users are advised to exercise caution when interacting with online content and avoid downloading software or media from untrusted or unofficial sources.

tines

Automated Pentesting Covers Only 1 of 6 Surfaces.

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.


文章来源: https://www.bleepingcomputer.com/news/security/new-crystalrat-malware-adds-rat-stealer-and-prankware-features/
如有侵权请联系:admin#unsafe.sh