NonEuclid RAT: The Latest Cybersecurity Threat with Advanced Evasion and Ransomware Features.
Cybersecurity experts have uncovered a new remote access trojan (RAT) named NonEuclid, which enables attackers to remotely control compromised Windows systems.
“NonEuclid, developed in C#, is a highly advanced malware that provides unauthorized remote access and employs sophisticated evasion techniques,” Cyfirma stated in a technical analysis published last week.
The RAT leverages a range of methods, including antivirus bypassing, privilege escalation, anti-detection mechanisms, and ransomware encryption targeting critical files.
First detected in underground forums in late November 2024, NonEuclid has been actively advertised as a crimeware solution. Discussions and tutorials about the malware have also surfaced on platforms like Discord and YouTube, signaling a deliberate effort to promote and distribute it.
Read More: Cyberattackers Seize Control of 16 Chrome Extensions, 600,000 Users Data at Risk
NonEuclid initiates with a client application setup, followed by multiple anti-detection checks. Once these are completed, it establishes a TCP socket for communication with a designated IP address and port. The malware configures exclusions in Microsoft Defender Antivirus to evade detection and monitors processes such as “taskmgr.exe,” “processhacker.exe,” and “procexp.exe,” which are commonly used for process management and analysis.
“NonEuclid employs Windows API calls, such as CreateToolhelp32Snapshot, Process32First, and Process32Next, to enumerate active processes and match their names against specific targets,” Cyfirma noted. Based on the AntiProcessMode setting, it can either terminate these processes or cause the client application to exit.
The malware incorporates several anti-analysis strategies, including checks to detect virtual machines or sandboxed environments, terminating itself if such conditions are identified. It also bypasses the Windows Antimalware Scan Interface (AMSI) to avoid being flagged by security systems.
NonEuclid maintains persistence through scheduled tasks and modifications to the Windows Registry. It also attempts to elevate privileges by bypassing User Account Control (UAC) protections to execute commands. Notably, it includes a ransomware component, encrypting files with extensions like .CSV, .TXT, and .PHP and appending them with the extension .NonEuclid.
“NonEuclid represents the growing sophistication of modern malware, blending advanced stealth capabilities, anti-detection mechanisms, and ransomware functionalities,” Cyfirma explained. Its promotion across underground forums, Discord, and tutorial platforms underscores its appeal to cybercriminals and highlights the challenges in countering such threats.
With features like privilege escalation, AMSI bypass, and process termination, NonEuclid demonstrates a high level of adaptability in evading security defenses.
Testing software across multiple platforms is crucial for a programmer. However, managing multiple virtual machines…
Imagine launching a flash sale on your e-commerce platform. Customers rush in, eager to take…
The digital revolution has transformed the way we handle money, with cryptocurrencies taking center stage.…
We are thrilled to announce the official launch of BDRCloud, an innovative cloud-hosted backup and…
The world of technology is changing rapidly, and programming languages are among the foundational tools…
We are in the era of cloud computing, providing businesses with a scalable, flexible, and…