Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Attackers Abuse Amazon SES for Authenticated Ph Send Phishing
May 5, 2026
New Framework Connects APT Campaigns Across All Layers
May 5, 2026
WhatsApp Flaw Uses Instagram Reels for Malicious URL Execution
May 5, 2026
Home/CyberSecurity News/CrySome RAT: Advanced .NET Malware with AV Emerges Killer
CyberSecurity News

CrySome RAT: Advanced .NET Malware with AV Emerges Killer

The threat landscape now contends with a new and dangerous malware strain, purpose-built for stealth, persistence, and complete control over infected systems. CrySome RAT is written in C# and targets...

David kimber
David kimber
March 30, 2026 4 Min Read
0 0

The threat landscape now contends with a new and dangerous malware strain, purpose-built for stealth, persistence, and complete control over infected systems.

CrySome RAT is written in C# and targets the .NET ecosystem, giving attackers complete remote control over compromised Windows machines.

From stealing passwords and recording keystrokes to launching invisible desktop sessions, CrySome is designed for long-term access and deep system control over a persistent TCP-based command-and-control channel.

What makes CrySome stand out from other remote access trojans is its ability to survive even a full factory reset.

The malware copies itself into the Windows recovery partition located at C:RecoveryOEM and modifies the offline registry to trigger execution after a system restore.

This means that even when a victim believes their machine has been completely wiped clean, the malware quietly relaunches itself. This level of persistence engineering is rarely seen and places CrySome in a more serious category of threats compared to typical RATs circulating in the wild.

Cyfirma analysts identified the malware after conducting both static and dynamic analysis of its decompiled code, providing a clear look into its internal structure and modular design.

The research team noted that CrySome follows a modular architecture, where a bootstrap phase loads configuration settings and activates specific capabilities based on operator instructions.

Cyfirma researchers also noted that the malware communicates with its command-and-control server over TCP and immediately sends a detailed profile of the infected system upon connection, including the username, operating system details, uptime, country code, and even the title of the currently open window.

The malware also carries an aggressive defense evasion toolkit through its AVKiller module.

This component terminates antivirus processes, disables security services, blocks antivirus installation attempts, poisons the system’s hosts file to cut off AV update servers, and uses Image File Execution Options hijacking to prevent security tools from ever launching.

Major security products from vendors including Windows Defender, Kaspersky, CrowdStrike, ESET, Avast, and SentinelOne are all specifically targeted. Once the AVKiller module finishes its work, the infected system is left with little to no active protection.

The threat’s reach goes even further through its Hidden Virtual Network Computing module, or HVNC, which allows attackers to interact with the victim’s machine through a completely invisible desktop session.

This means an attacker can open browsers, access files, and navigate the system without the user ever seeing any activity on their screen.

Combined with keylogging, credential harvesting from Chromium-based browsers, webcam access, screen capture, and SOCKS proxy support for lateral movement, CrySome functions more like a full post-exploitation framework than a simple remote access tool.

Defense Evasion Through the AVKiller Module

One of the most technically significant aspects of CrySome RAT is how it handles defense evasion through its dedicated AVKiller module.

AVKiller AV Process Kill List and ScanAndKillProcesses Function (Source - Cyfirma)
AVKiller AV Process Kill List and ScanAndKillProcesses Function (Source – Cyfirma)

The module maintains hardcoded lists of antivirus process names, security service names, installer-related keywords, and antivirus update server domains.

When active, a function called ScanAndKillProcesses() runs continuously, scanning all active processes on the system and immediately terminating any that match its internal list.

It uses parallel execution to do this quickly, meaning security processes are killed almost as soon as they restart, leaving no window for protection to recover.

Beyond killing processes, the module also abuses the Windows Image File Execution Options registry key to assign a fake debugger to targeted security executables.

Whenever a blocked tool tries to launch, Windows silently redirects it to a harmless command that does nothing.

SetIFEOTraps Function (Source - Cyfirma)
SetIFEOTraps Function (Source – Cyfirma)

The security application appears to start but never actually runs, giving victims no visible sign that their protection has been stopped.

The module also calls PoisonHostsFile(), which rewrites the system’s hosts file to redirect antivirus update domains to 0.0.0.0, blocking signature and definition updates entirely.

Over time, even if a security product manages to survive, it becomes outdated and far less effective.

PoisonHostsFile Function (Source - Cyfirma)
PoisonHostsFile Function (Source – Cyfirma)

Security teams and system administrators should take the following steps in response to this threat. Any system showing indicators tied to CrySome RAT should be isolated immediately to stop lateral movement.

Endpoint detection and response tools capable of catching process injection, registry changes, and service abuse should be deployed across all environments.

Scheduled tasks, Windows services, and Run/RunOnce registry keys should be checked regularly for entries that were not authorized. The domain crysome[.]net and any related infrastructure should be blocked at the network level.

Tamper protection should be turned on to prevent scripts or policy changes from disabling security tools.

Recovery partitions and offline registry hives require deep forensic examination during any remediation effort to confirm no hidden persistence survives.

Application control policies should be enforced to stop unknown or unsigned binaries from running, especially from user-writable folders. Finally, offline backups and verified system images should be maintained to support full recovery when needed.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwareSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

New ClickFix Variant Evades PowerShell via Rundll32

Next Post

North Korean IT Worker Used Stolen ID & Allegedly Identity

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Android Zero-Click Flaw Grants Remote Shell Access
May 5, 2026
pnpm 11 Turns On Minimum Release Age by Default to Reduce npm
May 5, 2026
Microsoft Edge Vulnerability: Passwords in Cleartext Memory
May 5, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us