A laughing RAT: CrystalX combines spyware; stealer; and prankware features
In March 2026, a new MaaS active campaign was discovered promoting previously unknown malware in private Telegram chats. The Trojan features an extensive arsenal of capabilities. On the panel provided to third‑party actors, in addition to the standard features of RAT‑like malware, a stealer, keylogger, clipper, and spyware are also available.
AI Analysis
Technical Summary
CrystalX is a sophisticated malware-as-a-service Trojan first identified in March 2026, distributed primarily through private Telegram channels. It offers a comprehensive suite of malicious capabilities, combining traditional RAT features with spyware, keylogging, credential stealing, and clipper functionalities. The RAT component allows attackers to remotely control infected systems, execute commands, and exfiltrate data. The stealer module targets sensitive information such as passwords and cookies, while the keylogger captures keystrokes to harvest credentials and other confidential inputs. The clipper feature intercepts clipboard data, often replacing cryptocurrency wallet addresses to divert transactions. The malware is managed via a control panel accessible to third-party actors, facilitating widespread misuse without requiring advanced technical skills. Indicators of compromise include specific file hashes and domains like crystalxrat.top and webcrystal.lol. Although no public CVE or known exploits are reported, the malware’s MaaS distribution model and multifunctional payload increase its potential reach and impact. The campaign’s discovery in private Telegram chats suggests targeted distribution and potential for rapid proliferation among cybercriminal communities.
Potential Impact
The CrystalX RAT poses a medium-level threat with significant implications for confidentiality and integrity. Its ability to remotely control infected systems can lead to unauthorized data access, espionage, and lateral movement within networks. The stealer and keylogger components threaten user credentials, financial information, and personal data, increasing risks of identity theft and financial fraud. The clipper functionality specifically endangers cryptocurrency users by redirecting transactions to attacker-controlled wallets, causing direct financial loss. The prankware features, while less severe, can disrupt user operations and degrade trust in affected systems. The MaaS model lowers the entry barrier for attackers, potentially increasing the volume and diversity of attacks globally. Organizations may face data breaches, operational disruptions, and reputational damage if infected. The lack of known exploits in the wild currently limits immediate widespread impact, but the active promotion and availability of the malware suggest a high potential for future attacks.
Mitigation Recommendations
Organizations should implement targeted detection strategies focusing on the identified file hashes and domains associated with CrystalX. Deploy endpoint detection and response (EDR) solutions capable of identifying RAT behaviors, keylogging activities, and clipboard manipulation. Network monitoring should include DNS filtering and blocking of known malicious domains such as crystalxrat.top and webcrystal.lol. Employ strict access controls and multi-factor authentication to limit attacker lateral movement post-compromise. User education is critical to reduce the risk of initial infection via phishing or social engineering, especially given the malware’s distribution through private Telegram channels. Regularly audit systems for unauthorized remote access tools and unusual outbound connections. Incident response plans should include procedures for isolating infected hosts and forensic analysis to identify data exfiltration. Consider deploying deception technologies to detect and disrupt RAT command and control communications. Finally, maintain updated threat intelligence feeds to stay informed on evolving indicators and tactics related to CrystalX.
Affected Countries
United States, Russia, China, India, Brazil, Germany, United Kingdom, France, South Korea, Japan
Indicators of Compromise
- hash: 1a68ae614fb2d8875cb0573e6a721b46
- hash: 2dbe6de177241c144d06355c381b868c
- hash: 47accb0ecfe8ccd466752dde1864f3b0
- hash: 49c74b302bfa32e45b7c1c5780dd0976
- hash: 88c60df2a1414cbf24430a74ae9836e0
- hash: e540e9797e3b814bfe0a82155dfe135d
- domain: crystalxrat.top
- domain: webcrystal.lol
- domain: webcrystal.sbs
A laughing RAT: CrystalX combines spyware; stealer; and prankware features
Description
In March 2026, a new MaaS active campaign was discovered promoting previously unknown malware in private Telegram chats. The Trojan features an extensive arsenal of capabilities. On the panel provided to third‑party actors, in addition to the standard features of RAT‑like malware, a stealer, keylogger, clipper, and spyware are also available.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CrystalX is a sophisticated malware-as-a-service Trojan first identified in March 2026, distributed primarily through private Telegram channels. It offers a comprehensive suite of malicious capabilities, combining traditional RAT features with spyware, keylogging, credential stealing, and clipper functionalities. The RAT component allows attackers to remotely control infected systems, execute commands, and exfiltrate data. The stealer module targets sensitive information such as passwords and cookies, while the keylogger captures keystrokes to harvest credentials and other confidential inputs. The clipper feature intercepts clipboard data, often replacing cryptocurrency wallet addresses to divert transactions. The malware is managed via a control panel accessible to third-party actors, facilitating widespread misuse without requiring advanced technical skills. Indicators of compromise include specific file hashes and domains like crystalxrat.top and webcrystal.lol. Although no public CVE or known exploits are reported, the malware’s MaaS distribution model and multifunctional payload increase its potential reach and impact. The campaign’s discovery in private Telegram chats suggests targeted distribution and potential for rapid proliferation among cybercriminal communities.
Potential Impact
The CrystalX RAT poses a medium-level threat with significant implications for confidentiality and integrity. Its ability to remotely control infected systems can lead to unauthorized data access, espionage, and lateral movement within networks. The stealer and keylogger components threaten user credentials, financial information, and personal data, increasing risks of identity theft and financial fraud. The clipper functionality specifically endangers cryptocurrency users by redirecting transactions to attacker-controlled wallets, causing direct financial loss. The prankware features, while less severe, can disrupt user operations and degrade trust in affected systems. The MaaS model lowers the entry barrier for attackers, potentially increasing the volume and diversity of attacks globally. Organizations may face data breaches, operational disruptions, and reputational damage if infected. The lack of known exploits in the wild currently limits immediate widespread impact, but the active promotion and availability of the malware suggest a high potential for future attacks.
Mitigation Recommendations
Organizations should implement targeted detection strategies focusing on the identified file hashes and domains associated with CrystalX. Deploy endpoint detection and response (EDR) solutions capable of identifying RAT behaviors, keylogging activities, and clipboard manipulation. Network monitoring should include DNS filtering and blocking of known malicious domains such as crystalxrat.top and webcrystal.lol. Employ strict access controls and multi-factor authentication to limit attacker lateral movement post-compromise. User education is critical to reduce the risk of initial infection via phishing or social engineering, especially given the malware’s distribution through private Telegram channels. Regularly audit systems for unauthorized remote access tools and unusual outbound connections. Incident response plans should include procedures for isolating infected hosts and forensic analysis to identify data exfiltration. Consider deploying deception technologies to detect and disrupt RAT command and control communications. Finally, maintain updated threat intelligence feeds to stay informed on evolving indicators and tactics related to CrystalX.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://securelist.com/crystalx-rat-with-prankware-features/119283/"]
- Adversary
- null
- Pulse Id
- 69ccba2f8538ade72d6e71e6
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash1a68ae614fb2d8875cb0573e6a721b46 | — | |
hash2dbe6de177241c144d06355c381b868c | — | |
hash47accb0ecfe8ccd466752dde1864f3b0 | — | |
hash49c74b302bfa32e45b7c1c5780dd0976 | — | |
hash88c60df2a1414cbf24430a74ae9836e0 | — | |
hashe540e9797e3b814bfe0a82155dfe135d | — |
Domain
| Value | Description | Copy |
|---|---|---|
domaincrystalxrat.top | — | |
domainwebcrystal.lol | — | |
domainwebcrystal.sbs | — |
Threat ID: 69ccf214e6bfc5ba1dbff3a5
Added to database: 4/1/2026, 10:23:16 AM
Last enriched: 4/1/2026, 10:38:19 AM
Last updated: 4/4/2026, 7:40:14 AM
Views: 51
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.