CrystalX RAT: New Malware-as-a-Service Combines Spyware, Stealer, and Prankware Capabilities

Kaspersky researchers have uncovered CrystalX RAT, a sophisticated new malware-as-a-service (MaaS) platform that combines remote access trojan capabilities with data theft, keylogging, and uniquely disturbing prankware features designed to psychologically torment victims.

From Webcrystal to CrystalX: The Evolution

First observed in January 2026 as Webcrystal RAT, the malware was initially promoted through private Telegram groups. By March 2026, the operators rebranded to CrystalX RAT and expanded marketing efforts to YouTube, offering three subscription tiers to accommodate cybercriminals with varying budgets and requirements.

The malware includes a sophisticated control panel with an auto-builder feature that allows attackers to customize payloads with options including geoblocking, anti-analysis tools, and file appearance modifications. Payloads are compressed with zlib and encrypted using ChaCha20 encryption, making detection more difficult.

Advanced Anti-Analysis Techniques

CrystalX RAT employs multiple layers of defense against security researchers:

  • Proxy and MITM detection to evade traffic analysis
  • Virtual machine detection to avoid sandbox execution
  • Anti-attach loops preventing debugger connections
  • Stealth patches that bypass security functions

Comprehensive Data Theft Capabilities

Once executed, CrystalX establishes a connection to its command-and-control server using the WebSocket protocol with a hard-coded URL. The malware collects extensive system information and targets credentials from popular applications:

  • Steam gaming platform credentials
  • Discord authentication tokens
  • Telegram session data
  • Chromium-based browser data via ChromeElevator utility
  • Yandex and Opera browsers with dedicated routines

The RAT includes a real-time keylogger that streams keystrokes to attackers and a clipboard hijacker capable of altering copied content. Most concerning is its ability to inject malicious browser extensions that silently replace cryptocurrency wallet addresses during transactions.

Full Remote Access Control

Beyond data theft, CrystalX provides operators with complete remote access capabilities:

  • Remote command execution
  • File system management
  • VNC screen control for visual monitoring
  • Audio and video capture from webcams and microphones

Unique Prankware Features: Psychological Warfare

What sets CrystalX apart from typical RATs is its “Rofl” section containing harassment features designed to torment victims psychologically. These capabilities appear aimed at attracting novice cybercriminals seeking entertainment value:

  • Desktop wallpaper changes
  • Screen rotation manipulation
  • Mouse button swapping and random cursor movement
  • Peripheral device disabling
  • Forced system shutdowns
  • Icon hiding and system tool disabling
  • Fake notification displays
  • Direct chat window for victim interaction

Current Victim Profile and Future Outlook

While the initial infection vector remains unclear, Kaspersky has identified dozens of victims primarily located in Russia. However, the MaaS model has no geographic restrictions, and researchers warn that active development, regular updates, and aggressive promotion suggest CrystalX RAT infections will increase significantly in the near future.

“The sheer variety of available RATs has perpetuated demand, as actors prioritize flexibility of existing malware and its infrastructure,” Kaspersky researchers noted. “CrystalX RAT represents a highly functional MaaS platform that is not limited to espionage capabilities – spyware, keylogging and remote control – but includes unique stealer and prankware features.”

Recommendations

Organizations and individuals should implement the following protections:

  • Deploy endpoint detection and response (EDR) solutions capable of detecting WebSocket-based C2 communications
  • Monitor for suspicious browser extension installations
  • Implement application whitelisting to prevent unauthorized executables
  • Educate users about avoiding untrusted Telegram channels and suspicious software downloads
  • Use hardware wallets for cryptocurrency transactions to prevent clipboard hijacking attacks

Source: Security Affairs | Kaspersky Securelist

Leave a Reply

Your email address will not be published. Required fields are marked *