๐จ ๐ก๐ฒ๐ ๐ ๐ผ๐ฑ๐๐น๐ฎ๐ฟ ๐ฅ๐๐ง ๐ช๐ถ๐๐ต ๐ฉ๐ถ๐ฐ๐๐ถ๐บ ๐ฃ๐ฟ๐ผ๐ณ๐ถ๐น๐ถ๐ป๐ด: ๐๐ฒ๐๐ฒ๐ฐ๐ ๐๐ ๐๐ฎ๐ฟ๐น๐
We identified #KarstoRAT, a new malware that had zero detections on VirusTotal at the time of analysis. ๐๐ ๐ฑ๐ถ๐๐ด๐๐ถ๐๐ฒ๐ ๐ถ๐๐ ๐๐ฎ ๐๐ฟ๐ฎ๐ณ๐ณ๐ถ๐ฐ ๐ฎ๐ ๐น๐ฒ๐ด๐ถ๐๐ถ๐บ๐ฎ๐๐ฒ ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ผ๐ณ๐๐๐ฎ๐ฟ๐ฒ by using the User-Agent SecurityNotifier, increasing the risk of prolonged dwell time and opearional disruption.
โ ๏ธ ๐ง๐ต๐ถ๐ ๐ถ๐ ๐ป๐ผ๐ ๐ฏ๐น๐ถ๐ป๐ฑ ๐บ๐ฎ๐๐ ๐ฑ๐ฒ๐ฝ๐น๐ผ๐๐บ๐ฒ๐ป๐. KarstoRAT checks the victimโs external IP via api[.]ipify[.]org and maintains heartbeat and logging endpoints with its C2. This behavior suggests selective activation of certain modules based on country, network, or public IP.
โ๏ธ๐ฆ๐ฒ๐ฝ๐ฎ๐ฟ๐ฎ๐๐ฒ ๐๐ฒ๐ฟ๐๐ฒ๐ฟ ๐ฝ๐ฎ๐๐ต๐ ๐ณ๐ผ๐ฟ ๐ฑ๐ฎ๐๐ฎ ๐ฎ๐ป๐ฑ ๐ฐ๐ผ๐บ๐บ๐ฎ๐ป๐ฑ๐ ๐ฏ๐ฎ๐ฐ๐ธ ๐๐ต๐ถ๐ ๐๐ฝ. The C2 is modular, with functions managed independently. This enables controlled deployment and selective capability use, making campaigns harder to detect and contain at an early stage.
โ๏ธ Functionally, KarstoRAT combines surveillance and remote control: it steals credentials and tokens, logs keystrokes and clipboard data, executes remote commands, uploads payloads, and exfiltrates files, while also capturing screenshots, webcam, and audio activity on the infected host.
Persistence is set via Run keys, the Startup folder, and a scheduled SystemCheck task. For privilege escalation, it abuses fodhelper.exe and hijacks the ms-settings\Shell\Open\command registry path.
To avoid detection, KarstoRAT checks for debuggers and security analysis software. #ANYRUN Sandbox bypasses these checks, exposing full behavior within seconds.
Before threats turn into longer investigations and business impact, security teams use #ANYRUN to move from unclear signals to evidence-based action faster โ
๐พ See sample execution in a live analysis session: https://app.any.run/tasks/7f289c04-c532-4879-836f-a3931822ed24/?utm_source=mastodon&utm_medium=post&utm_campaign=karstorat&utm_term=250226&utm_content=linktoservice
๐ Pivot from #IOCs and subscribe to Query Updates in TI Lookup to proactively track evolving attacks: https://intelligence.any.run/analysis/lookup?utm_source=mastodon&utm_medium=post&utm_campaign=karstorat&utm_content=250226&utm_term=linktotilookup#%7B%2522query%2522:%2522url:%255C%2522*/notify?event=heartbeat&user=*&public_ip=%255C%2522%2522,%2522dateRange%2522:30%7D%20
Equip your SOC with faster decisions and lower workload. See how #ANYRUN fits your workflows: https://any.run/enterprise/?utm_source=mastodon&utm_medium=post&utm_campaign=karstorat&utm_term=250226&utm_content=linktoenterpriselanding
IOCs:
Domain:
hallucinative-shabbily-olga[.]ngrok-free[.]dev
IP:
212[.]227[.]65[.]132
HeartBeat URL:
"*/notify?event=heartbeat&user=*&public_ip="
Sha256:
839e882551258bf34e5c5105147f7198af2daf7e579d7d4a8c5f1f105966fd7e
07131e3fcb9e65c1e4d2e756efdb9f263fd90080d3ff83fbcca1f31a4890ebdb
ee5b0c1f0015b9f59e34ef8017ead6e83259b32c4b0e07dc1f894b0d407094a3
aca3f2902307c5ebdb43811b74000783d61b6ad29d7796bb8107d8b1b38d76a3







decio

