Back to Feed
MalwareApr 1, 2026

New CrystalRAT malware adds RAT, stealer and prankware features

CrystalRAT malware-as-a-service emerges on Telegram with RAT, stealer, and prankware capabilities.

Summary

CrystalRAT, a new malware-as-a-service promoted on Telegram and YouTube since January 2026, offers remote access, data theft, keylogging, and clipboard hijacking alongside unusual prankware features designed to disrupt systems. The Go-based malware shares similarities with WebRAT, uses ChaCha20 encryption and WebSocket C2 communication, and includes anti-analysis features like VM detection and anti-debugging. Its capabilities target Chromium browsers, Discord, Steam, and Telegram, while prankware functions (desktop manipulation, fake notifications, device control disruption) may serve as distraction or victim manipulation tactics.

Full text

New CrystalRAT malware adds RAT, stealer and prankware features By Bill Toulas April 1, 2026 07:17 PM 0 A new malware-as-a-service called CrystalRAT is being promoted on Telegram, offering remote access, data theft, keylogging, and clipboard hijacking capabilities. The malware emerged in January with a tiered subscription model. Apart from the Telegram channel, the MaaS was also promoted on YouTube, via a dedicated marketing channel that showcased its capabilities. Kaspersky researchers say in a report today that the malware features strong similarities to WebRAT (Salat Stealer), including the same panel design, Go-based code, and a similar bot-based sales system. CrystalX also includes an extensive list of prankware features designed to annoy the user or disrupt their work. Despite its "fun" side, CrystalX offers a large set of data theft capabilities. Telegram channel promoting CrystaX RATSource: Kaspersky CrystalX RAT details Kaspersky says that the malware provides a user-friendly control panel and an automated builder tool that supports customization options, including geoblocking, executable customization, and anti-analysis features (anti-debugging, VM detection, proxy detection, etc.). The generated payloads are zlib-compressed and encrypted with the ChaCha20 symmetric stream cipher for protection. The malware connects to the command-and-control (C2) via WebSocket and sends info about the host for profiling and infection tracking. CrystalX’s infostealer component, which Kaspersky found to be temporarily disabled as it is being prepared for an upgrade, targets Chromium-based browsers via the ChromeElevator tool, Yandex, and Opera. Additionally, the tool collects data from desktop apps such as Steam, Discord, and Telegram. The remote access module can be used to execute commands via CMD, upload/download files, browse the file system, and control the machine in real time via built-in VNC. The malware also exhibits spyware-like behavior, as it can capture video and audio from the microphone. Finally, CrystalX features a keylogger that streams keystrokes in real time to the C2, and a clipper tool that uses regular expressions to detect wallet addresses in the clipboard and replace them with ones the attacker provides. Remote desktop function in CrystalX RAT panelSource: Kaspersky Putting some “fun” in the package What sets CrystalX apart in the crowded MaaS space is its rich set of prankware features. According to Kaspersky, the malware can do the following on infected devices: change desktop wallpaper alter display orientation to various angles force system shutdown remap mouse buttons disable input devices (keyboard/mouse/monitor) show fake notifications change cursor position on the screen hide various components (desktop icons, taskbar, the Task Manager, and the Command Prompt executable) Provide attacker-victim chat window While the above features do not improve the attack’s monetization potential for cybercriminals, they certainly make the product distinctive, and could bait script kiddies and low-skilled/entry-level threat actors into getting a subscription. Another reason for the prank features could be potential for victim manipulation, or even distraction, while the data theft modules run in the background. To reduce the risk of malware infections, users are advised to exercise caution when interacting with online content and avoid downloading software or media from untrusted or unofficial sources. Automated Pentesting Covers Only 1 of 6 Surfaces. Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation. Get Your Copy Now Related Articles: New Torg Grabber infostealer malware targets 728 crypto walletsQuickLens Chrome extension steals crypto, shows ClickFix attackArkanix Stealer pops up as short-lived AI info-stealer experimentInfostealer malware found stealing OpenClaw secrets for first time'NoVoice' Android malware on Google Play infected 2.3 million devices

Indicators of Compromise

  • malware — CrystalRAT
  • malware — WebRAT (Salat Stealer)
  • malware — ChromeElevator