(Don't) TrustConnect: It's a RAT in an RMM hat
A new malware-as-a-service (MaaS) called TrustConnect has been discovered masquerading as a legitimate remote monitoring and management (RMM) tool. The malware, classified as a remote access trojan (RAT), uses a fake business website as its command and control center and MaaS portal. Priced at $300 per month, it offers features like a web-based C2 dashboard, automated payload generation with digital signatures, and remote desktop capabilities. The malware has been distributed through various email campaigns, often alongside legitimate RMM tools. Proofpoint researchers identified links between TrustConnect's creator and previous users of Redline stealer. The emergence of this new MaaS demonstrates the ongoing evolution of the cybercrime market and the thriving ecosystem of RMM abuse.
AI Analysis
Technical Summary
TrustConnect is a sophisticated remote access trojan (RAT) offered as a malware-as-a-service (MaaS) that impersonates legitimate remote monitoring and management (RMM) software. It is marketed via a fake business website that serves as both the command and control (C2) infrastructure and the MaaS portal. For $300 per month, customers gain access to a web-based C2 dashboard, automated payload generation with digital signatures to evade detection, and remote desktop control features. The malware is primarily distributed through targeted email campaigns, often bundled with or mimicking legitimate RMM tools to increase trust and evade suspicion. Proofpoint researchers have linked the TrustConnect creator to prior users of the Redline stealer, suggesting a well-established cybercriminal network behind this operation. The malware abuses the trust placed in RMM tools, which are commonly used by IT administrators for legitimate remote access and management, thereby complicating detection and response. Indicators of compromise include multiple malicious domains and IP addresses hosting payloads, as well as specific file hashes associated with the malware. Although no CVE or known exploits in the wild are reported yet, the malware’s capabilities allow attackers to remotely control infected systems, exfiltrate data, and potentially move laterally within networks. This MaaS model lowers the barrier to entry for cybercriminals, fueling the ongoing evolution of cybercrime and the abuse of trusted IT management tools.
Potential Impact
The TrustConnect RAT poses a significant threat to organizations worldwide by enabling attackers to gain persistent, stealthy remote access to compromised systems. Its masquerade as legitimate RMM software increases the likelihood of successful infection and reduces suspicion by IT staff. Once deployed, attackers can exfiltrate sensitive data, deploy additional malware, conduct espionage, and move laterally within corporate networks. The use of digitally signed payloads and a professional MaaS portal enhances operational security for attackers, complicating detection by traditional security tools. The distribution via email campaigns alongside legitimate RMM tools increases the risk of widespread compromise, especially in organizations that rely heavily on remote management solutions. The malware’s link to Redline stealer users suggests potential for credential theft and further exploitation. Overall, TrustConnect can lead to data breaches, operational disruption, financial loss, and reputational damage. The MaaS model also means that a broad range of threat actors, including less skilled ones, can leverage this tool, increasing the volume and diversity of attacks.
Mitigation Recommendations
Organizations should implement multi-layered defenses specifically tailored to detect and prevent RMM tool abuse. This includes: 1) Strictly verifying the authenticity of all remote management software and their sources before installation, avoiding downloads from untrusted domains or links. 2) Employing advanced email filtering and phishing detection to block malicious campaigns distributing TrustConnect payloads. 3) Monitoring network traffic for connections to known malicious domains and IP addresses associated with TrustConnect C2 infrastructure, using threat intelligence feeds to update detection rules. 4) Implementing application allowlisting to prevent unauthorized execution of unknown or suspicious MSI installers and payloads. 5) Enforcing least privilege principles for remote access tools and regularly auditing their usage and configurations. 6) Utilizing endpoint detection and response (EDR) solutions capable of identifying anomalous remote desktop activity and suspicious process behaviors related to RATs. 7) Educating IT and security teams about the risks of RMM abuse and indicators of TrustConnect infection. 8) Regularly updating and patching all software to reduce attack surface. 9) Employing multi-factor authentication (MFA) for all remote access portals to reduce risk of credential compromise. 10) Conducting threat hunting exercises focused on detecting RMM tool misuse and lateral movement patterns.
Affected Countries
United States, United Kingdom, Canada, Australia, Germany, France, Netherlands, Japan, South Korea, India
Indicators of Compromise
- ip: 192.159.99.83
- hash: 3a0dc172a2e7c42ae356de489d4ee73c
- hash: bb8d4ead5c3099424d2718a0feb286ad
- hash: 1c94d0497214be31621ae825d88d29195617a109
- hash: d8dc6c075e4efc9da65dfbd2f755a783a7455232
- hash: 162c0d3e671ddf4f7f3ae5681da5272111eab6588bc53843cc604fc386634594
- hash: cee6895f7df01da489c10bf5b83770ceede79ed4e1c8c4f8ea9787a4d035c79b
- hash: cf85a4816715b8fa6c1eb5b50d1c70cfef116522742f6f1c77cb8689166b9f40
- url: http://192.159.99.83/Bin/ScreenConnect.ClientSetup.msi?e=Access&y=Guest
- url: http://192.227.211.41:8040/Bin/ScreenConnect.ClientSetup.msi?e=Access&y=Guest
- url: http://aerobickarlaurbanovas.top/Bin/ScreenConnect.ClientSetup.msi?e=Access&y=Guest=
- url: http://memphiswawu.com/Bin/ScreenConnect.ClientSetup.msi?e=Access&y=Guest
- url: http://smallmartdirectintense.com/Bin/ScreenConnect.ClientSetup.msi?e=Access&y=Guest=
- url: http://stewise.top/Bin/ScreenConnect.ClientSetup.msi?e=Access&y=Guest
- domain: aerobickarlaurbanovas.top
- domain: ametax.net
- domain: elev8souvenirs.com
- domain: memphiswawu.com
- domain: networkservice.cyou
- domain: smallmartdirectintense.com
- domain: statementstview.online
- domain: stewise.top
- domain: vurul.click
- domain: adobe.caladzy.com
(Don't) TrustConnect: It's a RAT in an RMM hat
Description
A new malware-as-a-service (MaaS) called TrustConnect has been discovered masquerading as a legitimate remote monitoring and management (RMM) tool. The malware, classified as a remote access trojan (RAT), uses a fake business website as its command and control center and MaaS portal. Priced at $300 per month, it offers features like a web-based C2 dashboard, automated payload generation with digital signatures, and remote desktop capabilities. The malware has been distributed through various email campaigns, often alongside legitimate RMM tools. Proofpoint researchers identified links between TrustConnect's creator and previous users of Redline stealer. The emergence of this new MaaS demonstrates the ongoing evolution of the cybercrime market and the thriving ecosystem of RMM abuse.
AI-Powered Analysis
Technical Analysis
TrustConnect is a sophisticated remote access trojan (RAT) offered as a malware-as-a-service (MaaS) that impersonates legitimate remote monitoring and management (RMM) software. It is marketed via a fake business website that serves as both the command and control (C2) infrastructure and the MaaS portal. For $300 per month, customers gain access to a web-based C2 dashboard, automated payload generation with digital signatures to evade detection, and remote desktop control features. The malware is primarily distributed through targeted email campaigns, often bundled with or mimicking legitimate RMM tools to increase trust and evade suspicion. Proofpoint researchers have linked the TrustConnect creator to prior users of the Redline stealer, suggesting a well-established cybercriminal network behind this operation. The malware abuses the trust placed in RMM tools, which are commonly used by IT administrators for legitimate remote access and management, thereby complicating detection and response. Indicators of compromise include multiple malicious domains and IP addresses hosting payloads, as well as specific file hashes associated with the malware. Although no CVE or known exploits in the wild are reported yet, the malware’s capabilities allow attackers to remotely control infected systems, exfiltrate data, and potentially move laterally within networks. This MaaS model lowers the barrier to entry for cybercriminals, fueling the ongoing evolution of cybercrime and the abuse of trusted IT management tools.
Potential Impact
The TrustConnect RAT poses a significant threat to organizations worldwide by enabling attackers to gain persistent, stealthy remote access to compromised systems. Its masquerade as legitimate RMM software increases the likelihood of successful infection and reduces suspicion by IT staff. Once deployed, attackers can exfiltrate sensitive data, deploy additional malware, conduct espionage, and move laterally within corporate networks. The use of digitally signed payloads and a professional MaaS portal enhances operational security for attackers, complicating detection by traditional security tools. The distribution via email campaigns alongside legitimate RMM tools increases the risk of widespread compromise, especially in organizations that rely heavily on remote management solutions. The malware’s link to Redline stealer users suggests potential for credential theft and further exploitation. Overall, TrustConnect can lead to data breaches, operational disruption, financial loss, and reputational damage. The MaaS model also means that a broad range of threat actors, including less skilled ones, can leverage this tool, increasing the volume and diversity of attacks.
Mitigation Recommendations
Organizations should implement multi-layered defenses specifically tailored to detect and prevent RMM tool abuse. This includes: 1) Strictly verifying the authenticity of all remote management software and their sources before installation, avoiding downloads from untrusted domains or links. 2) Employing advanced email filtering and phishing detection to block malicious campaigns distributing TrustConnect payloads. 3) Monitoring network traffic for connections to known malicious domains and IP addresses associated with TrustConnect C2 infrastructure, using threat intelligence feeds to update detection rules. 4) Implementing application allowlisting to prevent unauthorized execution of unknown or suspicious MSI installers and payloads. 5) Enforcing least privilege principles for remote access tools and regularly auditing their usage and configurations. 6) Utilizing endpoint detection and response (EDR) solutions capable of identifying anomalous remote desktop activity and suspicious process behaviors related to RATs. 7) Educating IT and security teams about the risks of RMM abuse and indicators of TrustConnect infection. 8) Regularly updating and patching all software to reduce attack surface. 9) Employing multi-factor authentication (MFA) for all remote access portals to reduce risk of credential compromise. 10) Conducting threat hunting exercises focused on detecting RMM tool misuse and lateral movement patterns.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.proofpoint.com/us/blog/threat-insight/dont-trustconnect-its-a-rat"]
- Adversary
- null
- Pulse Id
- 6996efa6c7a901cbcb67660e
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip192.159.99.83 | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash3a0dc172a2e7c42ae356de489d4ee73c | — | |
hashbb8d4ead5c3099424d2718a0feb286ad | — | |
hash1c94d0497214be31621ae825d88d29195617a109 | — | |
hashd8dc6c075e4efc9da65dfbd2f755a783a7455232 | — | |
hash162c0d3e671ddf4f7f3ae5681da5272111eab6588bc53843cc604fc386634594 | — | |
hashcee6895f7df01da489c10bf5b83770ceede79ed4e1c8c4f8ea9787a4d035c79b | — | |
hashcf85a4816715b8fa6c1eb5b50d1c70cfef116522742f6f1c77cb8689166b9f40 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://192.159.99.83/Bin/ScreenConnect.ClientSetup.msi?e=Access&y=Guest | — | |
urlhttp://192.227.211.41:8040/Bin/ScreenConnect.ClientSetup.msi?e=Access&y=Guest | — | |
urlhttp://aerobickarlaurbanovas.top/Bin/ScreenConnect.ClientSetup.msi?e=Access&y=Guest= | — | |
urlhttp://memphiswawu.com/Bin/ScreenConnect.ClientSetup.msi?e=Access&y=Guest | — | |
urlhttp://smallmartdirectintense.com/Bin/ScreenConnect.ClientSetup.msi?e=Access&y=Guest= | — | |
urlhttp://stewise.top/Bin/ScreenConnect.ClientSetup.msi?e=Access&y=Guest | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainaerobickarlaurbanovas.top | — | |
domainametax.net | — | |
domainelev8souvenirs.com | — | |
domainmemphiswawu.com | — | |
domainnetworkservice.cyou | — | |
domainsmallmartdirectintense.com | — | |
domainstatementstview.online | — | |
domainstewise.top | — | |
domainvurul.click | — | |
domainadobe.caladzy.com | — |
Threat ID: 69970717b557332a80d468cb
Added to database: 2/19/2026, 12:50:31 PM
Last enriched: 2/19/2026, 1:06:09 PM
Last updated: 2/20/2026, 12:29:37 AM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-02-19
MediumUncovering Malicious Cryptocurrency Scam Domains and Hacked YouTube Channels
MediumClickFix in action: how fake captcha can encrypt an entire company
MediumFake Homebrew Pages Deliver Cuckoo Stealer via ClickFix | macOS Threat Hunting Analysis
MediumThe Curious Case of the Triton Malware Fork
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.