Cybersecurity experts have uncovered a new remote access trojan (RAT) named NonEuclid, which enables attackers to remotely control compromised Windows systems.
“NonEuclid, developed in C#, is a highly advanced malware that provides unauthorized remote access and employs sophisticated evasion techniques,” Cyfirma stated in a technical analysis published last week.
The RAT leverages a range of methods, including antivirus bypassing, privilege escalation, anti-detection mechanisms, and ransomware encryption targeting critical files.
First detected in underground forums in late November 2024, NonEuclid has been actively advertised as a crimeware solution. Discussions and tutorials about the malware have also surfaced on platforms like Discord and YouTube, signaling a deliberate effort to promote and distribute it.
Read More: Cyberattackers Seize Control of 16 Chrome Extensions, 600,000 Users Data at Risk
Core Functionality
NonEuclid initiates with a client application setup, followed by multiple anti-detection checks. Once these are completed, it establishes a TCP socket for communication with a designated IP address and port. The malware configures exclusions in Microsoft Defender Antivirus to evade detection and monitors processes such as “taskmgr.exe,” “processhacker.exe,” and “procexp.exe,” which are commonly used for process management and analysis.
“NonEuclid employs Windows API calls, such as CreateToolhelp32Snapshot, Process32First, and Process32Next, to enumerate active processes and match their names against specific targets,” Cyfirma noted. Based on the AntiProcessMode setting, it can either terminate these processes or cause the client application to exit.
Anti-Analysis and Evasion Techniques
The malware incorporates several anti-analysis strategies, including checks to detect virtual machines or sandboxed environments, terminating itself if such conditions are identified. It also bypasses the Windows Antimalware Scan Interface (AMSI) to avoid being flagged by security systems.
Persistence and Ransomware Features
NonEuclid maintains persistence through scheduled tasks and modifications to the Windows Registry. It also attempts to elevate privileges by bypassing User Account Control (UAC) protections to execute commands. Notably, it includes a ransomware component, encrypting files with extensions like .CSV, .TXT, and .PHP and appending them with the extension .NonEuclid.
Increasing Threat Sophistication
“NonEuclid represents the growing sophistication of modern malware, blending advanced stealth capabilities, anti-detection mechanisms, and ransomware functionalities,” Cyfirma explained. Its promotion across underground forums, Discord, and tutorial platforms underscores its appeal to cybercriminals and highlights the challenges in countering such threats.
With features like privilege escalation, AMSI bypass, and process termination, NonEuclid demonstrates a high level of adaptability in evading security defenses.