Threat Actor Characterization
You’re viewing the read-only version.
Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
KarstoRAT
ID: 67bbd9322176e6d8a2d234ee973edd1f80413
Crimeware
RAT
Trojan
Threat types: Remote Access Trojan, Malware
Progress: 67%
Completeness: 66%
Freshness: 70%
Operation zone: —
Aliases
Limited alias preview
| Karsto RAT | — | — | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
confidence: medium
KarstoRAT is an emerging modular RAT described in Feb 2026 OSINT as using victim profiling (external IP check), modular web-based C2 with heartbeat/logging endpoints, and a stealthy User-Agent string (SecurityNotifier). Reported capabilities include credential/token theft, keylogging, clipboard capture, remote command execution, payload upload, file exfiltration, and screenshot/webcam/audio capture. Persistence is described via Run keys, Startup folder, and a scheduled task named SystemCheck; privilege escalation is described via a fodhelper UAC bypass using ms-settings\Shell\Open\command registry hijack. Evidence is currently limited and should be treated as time-bounded and medium-confidence.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1071.001 | Web Protocols | TA0011 |
|
| T1547.001 | Registry Run Keys / Startup Folder | TA0003 TA0004 |
|
| T1053.005 | Scheduled Task | TA0002 TA0003 TA0004 |
|
| T1548.002 | Bypass User Account Control | TA0004 TA0005 |
|
| T1056.001 | Keylogging | TA0006 TA0009 |
|
| T1115 | Clipboard Data | TA0009 |
|
| T1113 | Screen Capture | TA0009 |
|
| T1125 | Video Capture | TA0009 |
|
| T1123 | Audio Capture | TA0009 |
|
| T1041 | Exfiltration Over C2 Channel | TA0010 |
|
| T1112 | Modify Registry | TA0003 TA0005 |
|
Executive brief
now
Saved successfully.
Hunting Playbook
now
Saved successfully.
IOC Appendix
now
Saved successfully.
OSINT Library
now
Saved successfully.