NonEuclid RAT exploits UAC bypass and AMSI evasion for stealthy cyberattacks

NonEuclid RAT exploits UAC bypass and AMSI evasion for stealthy cyberattacks

Cybersecurity researchers have uncovered a sophisticated new remote access trojan (RAT) named ‘NonEuclid’, which allows attackers to seize control of compromised Windows systems while evading detection with advanced techniques.

Developed in C# for the .NET Framework 4.8, NonEuclid leverages features like antivirus bypass, privilege escalation, anti-detection mechanisms, and ransomware encryption.

NonEuclid is a highly advanced malware designed for unauthorized remote access, featuring mechanisms to evade antivirus tools and security measures while targeting critical files with ransomware encryption, said cybersecurity firm Cyfirma in a technical analysis.

NonEuclid has been advertised on underground forums and social platforms like Discord and YouTube since November 2024, rapidly gaining traction among cybercriminals.

The malware’s functionality, include dynamic DLL loading and AES encryption to secure malicious payloads, anti-VM checks to detect virtual or sandboxed environments, terminating execution if found, Microsoft Defender Antivirus exclusions, preventing detection by the built-in security tool, ransomware capabilities to encrypt files with extensions such as .CSV, .TXT, and .PHP, appending the extension .NonEuclid.

Upon execution, NonEuclid begins by running a client application and conducting a series of checks to evade detection. It sets up a TCP socket for communication with a designated IP and port while continuously monitoring processes commonly used for malware analysis, such as:

NonEuclid employs Windows API calls to enumerate processes. Depending on its configuration, it either terminates the detected processes or shuts down its client application to avoid exposure.

Persistence is achieved through scheduled tasks and Windows Registry modifications, while User Account Control (UAC) bypass is exploited to elevate privileges and execute commands without user intervention.

A relatively unusual aspect of NonEuclid is its ability to act as ransomware. It encrypts specific file types and renames them with the .NonEuclid extension, locking victims out of their critical data.


Back to the list

Latest Posts

New PhaaS platform Lucid targets 169 entities across 88 countries using iMessage and RCS

New PhaaS platform Lucid targets 169 entities across 88 countries using iMessage and RCS

Lucid is capable of sending up to 100,000 smishing messages per day.
1 April 2025
Surge in attacks targeting Palo Alto networks gateways observed

Surge in attacks targeting Palo Alto networks gateways observed

The activity began on March 17, 2025, and persisted at a rate of nearly 20,000 unique IP addresses per day.
1 April 2025
Canadian hacker arrested for allegedly stealing data from Texas Republican Party

Canadian hacker arrested for allegedly stealing data from Texas Republican Party

Cottle allegedly hacked  third-party hosting company Epik that managed the website for the Texas Republican Party.
1 April 2025