Security & Infrastructure Tools
New CrystalRAT malware adds RAT, stealer and prankware features
A new malware-as-a-service called CrystalRAT has been promoted on Telegram and YouTube, offering remote access, data theft, keylogging, clipboard hijacking, and a suite of prankware features that can alter user interfaces and disrupt work. Kaspersky reports that CrystalRAT resembles WebRAT with similar panel design and Go-based code, uses zlib compression and ChaCha20 encryption for payloads, and communicates via WebSocket to its C2 server. The infostealer component targets Chromium browsers, Yandex, Opera, and collects data from apps like Steam, Discord, and Telegram. It includes a remote desktop feature with VNC, video/audio capture, keylogging, and clipboard manipulation. Prankware functions include changing wallpapers, rotating displays, disabling input devices, showing fake notifications, hiding system components, and providing an attacker-victim chat window. Users are advised to avoid downloading software from untrusted sources to reduce infection risk.

NEW CRYSTALRAT MALWARE ADDS RAT, STEALER AND PRANKWARE FEATURES
A newly surfaced malware-as-a-service campaign named CrystalRAT has begun promoting its capabilities in Telegram channels, advertising that it can deliver remote access, data theft, keylogging, and clipboard hijacking. The service reportedly emerged in January and operates on a tiered subscription model, with additional promotional activity on other platforms such as YouTube, where a dedicated channel showcases its functions. Security researchers have noted striking similarities between CrystalRAT and a known family, including the same panel layout, Go-based codebase, and a bot-driven sales pipeline that resembles other MaaS offerings in the wild.
What sets CrystalRAT apart in a crowded market is the breadth of its feature set, which now explicitly includes prankware alongside typical remote access and data theft tools. While marketed as a “fun” addition, the package still packs a substantial arsenal for attackers, making it attractive to a wide range of threat actors—from seasoned operators to less-experienced script-kiddies drawn by the novelty of prank features.
The core control mechanism centers on a user-friendly administration panel and an automated builder that can tailor payloads in real time. Customization options reportedly cover geoblocking, executable customization, and anti-analysis measures designed to impede defensive analysis. On the defensive side, the generated payloads are compressed with zlib and encrypted using the ChaCha20 cipher to complicate reverse engineering and traffic inspection. Communications with the command-and-control (C2) server are handled over WebSocket, enabling the malware to transmit host information for profiling and infection tracking without spilling its commands into plainly readable channels.
CrystalRAT’s information-stealing component targets multiple popular environments. Early demonstrations suggest a focus on Chromium-based browsers through a module known as ChromeElevator, with additional payloads aimed at other major browsers such as Yandex and Opera. Beyond browsers, the toolkit appears to extract data from widely used desktop applications, including Steam, Discord, and Telegram, providing a broad surface for credential harvesting and sensitive data exfiltration. The chain of custody for stolen data ends at the C2, where exfiltrated information is aggregated and exposed to operators for monetization.
The remote access portion of CrystalRAT enables a suite of real-time, on-device actions. Operators can issue commands through CMD, transfer files to and from the infected host, and navigate the machine’s file system. A built-in remote desktop feature furnishes real-time control over the device, effectively turning the compromised system into an open work surface for the attacker. This capability can be used for further lateral movement, data collection, or surveillance as the infection unfolds.
In addition to standard monitoring and control functions, CrystalRAT includes spyware-like capabilities such as capturing video from connected cameras and recording audio through the device’s microphone. A keylogger component streams keystrokes in real time back to the C2, creating a steady feed of sensitive input. A clipper tool operates as a currency-aware siphon, scanning clipboard content for wallet addresses and replacing them with values supplied by the attacker—an effective tactic for intercepting cryptocurrency transactions.
To distinguish itself from competitors, CrystalRAT also incorporates a comprehensive set of prankware features. When activated, these capabilities can alter the user’s experience in noticeable ways, including:
- Changing the desktop wallpaper
- Rotating the display orientation to various angles
- Forcing a system shutdown
- Remapping mouse buttons
- Disabling input devices such as the keyboard, mouse, or monitor
- Displaying fake or disruptive notifications
- Forcing cursor repositioning on the screen
- Hiding desktop icons, the taskbar, or even the Task Manager and Command Prompt
- Providing an attacker-victim chat interface to facilitate ongoing interaction
These prank-oriented tricks do not necessarily enhance the financial return of the malware, but they can attract attention, lure inexperienced operators, and create distraction while stealthier data-theft modules run in the background. The inclusion of such features also raises the stakes for victims, as manipulation and disruption can complicate incident response and remediation efforts.
From a defensive perspective, the CrystalRAT package represents a reminder that attacker toolchains are increasingly multi-purpose, blending covert data exfiltration with interactive and disruptive capabilities. The dual-use appeal of MaaS platforms—with their polished interfaces, customizable payloads, and seemingly harmless “fun” extras—creates a challenging exposure scenario for organizations and individual users alike. The best line of defense remains a combination of cautious digital hygiene, robust endpoint protections, and vigilant monitoring for unfamiliar payloads and unexpected network activity that might indicate a compromised host or an active intrusion.
As this family continues to evolve, researchers will be watching for changes in its anti-analysis strategies, expansion of the data theft surface, and refinements to its pranking toolkit. Early indicators suggest ongoing development and rapid iteration, which means defenders should stay alert for new variants, updated C2 protocols, and fresh targets that could broaden CrystalRAT’s footprint. In the meantime, awareness of its multi-faceted approach—remote access, data theft, real-time control, and disruptive pranks—highlights the importance of layered security that can detect and disrupt this kind of MaaS operation before it can cause meaningful harm.