8 January 2025

NonEuclid RAT exploits UAC bypass and AMSI evasion for stealthy cyberattacks


NonEuclid RAT exploits UAC bypass and AMSI evasion for stealthy cyberattacks

Cybersecurity researchers have uncovered a sophisticated new remote access trojan (RAT) named ‘NonEuclid’, which allows attackers to seize control of compromised Windows systems while evading detection with advanced techniques.

Developed in C# for the .NET Framework 4.8, NonEuclid leverages features like antivirus bypass, privilege escalation, anti-detection mechanisms, and ransomware encryption.

NonEuclid is a highly advanced malware designed for unauthorized remote access, featuring mechanisms to evade antivirus tools and security measures while targeting critical files with ransomware encryption, said cybersecurity firm Cyfirma in a technical analysis.

NonEuclid has been advertised on underground forums and social platforms like Discord and YouTube since November 2024, rapidly gaining traction among cybercriminals.

The malware’s functionality, include dynamic DLL loading and AES encryption to secure malicious payloads, anti-VM checks to detect virtual or sandboxed environments, terminating execution if found, Microsoft Defender Antivirus exclusions, preventing detection by the built-in security tool, ransomware capabilities to encrypt files with extensions such as .CSV, .TXT, and .PHP, appending the extension .NonEuclid.

Upon execution, NonEuclid begins by running a client application and conducting a series of checks to evade detection. It sets up a TCP socket for communication with a designated IP and port while continuously monitoring processes commonly used for malware analysis, such as:

NonEuclid employs Windows API calls to enumerate processes. Depending on its configuration, it either terminates the detected processes or shuts down its client application to avoid exposure.

Persistence is achieved through scheduled tasks and Windows Registry modifications, while User Account Control (UAC) bypass is exploited to elevate privileges and execute commands without user intervention.

A relatively unusual aspect of NonEuclid is its ability to act as ransomware. It encrypts specific file types and renames them with the .NonEuclid extension, locking victims out of their critical data.


Back to the list

Latest Posts

NonEuclid RAT exploits UAC bypass and AMSI evasion for stealthy cyberattacks

NonEuclid RAT exploits UAC bypass and AMSI evasion for stealthy cyberattacks

NonEuclid leverages features like antivirus bypass, privilege escalation, anti-detection mechanisms, and ransomware encryption.
8 January 2025
UN’s aviation agency confirms cyberattack on recruitment database

UN’s aviation agency confirms cyberattack on recruitment database

The announcement follows claims by a threat actor who leaked the stolen data on the BreachForums hacking forum.
8 January 2025
Mirai botnet variant exploits Four-Faith industrial router Flaw for DDoS attacks

Mirai botnet variant exploits Four-Faith industrial router Flaw for DDoS attacks

DDoS attacks conducted by the botnet peaked in October and November 2024, with short bursts of intense traffic reaching up to 100 Gbps.
8 January 2025