Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

(Don't) TrustConnect: It's a RAT in an RMM hat

0
Medium
Published: Thu Feb 19 2026 (02/19/2026, 11:10:29 UTC)
Source: AlienVault OTX General

Description

A new malware-as-a-service (MaaS) called TrustConnect has been discovered masquerading as a legitimate remote monitoring and management (RMM) tool. The malware, classified as a remote access trojan (RAT), uses a fake business website as its command and control center and MaaS portal. Priced at $300 per month, it offers features like a web-based C2 dashboard, automated payload generation with digital signatures, and remote desktop capabilities. The malware has been distributed through various email campaigns, often alongside legitimate RMM tools. Proofpoint researchers identified links between TrustConnect's creator and previous users of Redline stealer. The emergence of this new MaaS demonstrates the ongoing evolution of the cybercrime market and the thriving ecosystem of RMM abuse.

AI-Powered Analysis

AILast updated: 02/19/2026, 13:06:09 UTC

Technical Analysis

TrustConnect is a sophisticated remote access trojan (RAT) offered as a malware-as-a-service (MaaS) that impersonates legitimate remote monitoring and management (RMM) software. It is marketed via a fake business website that serves as both the command and control (C2) infrastructure and the MaaS portal. For $300 per month, customers gain access to a web-based C2 dashboard, automated payload generation with digital signatures to evade detection, and remote desktop control features. The malware is primarily distributed through targeted email campaigns, often bundled with or mimicking legitimate RMM tools to increase trust and evade suspicion. Proofpoint researchers have linked the TrustConnect creator to prior users of the Redline stealer, suggesting a well-established cybercriminal network behind this operation. The malware abuses the trust placed in RMM tools, which are commonly used by IT administrators for legitimate remote access and management, thereby complicating detection and response. Indicators of compromise include multiple malicious domains and IP addresses hosting payloads, as well as specific file hashes associated with the malware. Although no CVE or known exploits in the wild are reported yet, the malware’s capabilities allow attackers to remotely control infected systems, exfiltrate data, and potentially move laterally within networks. This MaaS model lowers the barrier to entry for cybercriminals, fueling the ongoing evolution of cybercrime and the abuse of trusted IT management tools.

Potential Impact

The TrustConnect RAT poses a significant threat to organizations worldwide by enabling attackers to gain persistent, stealthy remote access to compromised systems. Its masquerade as legitimate RMM software increases the likelihood of successful infection and reduces suspicion by IT staff. Once deployed, attackers can exfiltrate sensitive data, deploy additional malware, conduct espionage, and move laterally within corporate networks. The use of digitally signed payloads and a professional MaaS portal enhances operational security for attackers, complicating detection by traditional security tools. The distribution via email campaigns alongside legitimate RMM tools increases the risk of widespread compromise, especially in organizations that rely heavily on remote management solutions. The malware’s link to Redline stealer users suggests potential for credential theft and further exploitation. Overall, TrustConnect can lead to data breaches, operational disruption, financial loss, and reputational damage. The MaaS model also means that a broad range of threat actors, including less skilled ones, can leverage this tool, increasing the volume and diversity of attacks.

Mitigation Recommendations

Organizations should implement multi-layered defenses specifically tailored to detect and prevent RMM tool abuse. This includes: 1) Strictly verifying the authenticity of all remote management software and their sources before installation, avoiding downloads from untrusted domains or links. 2) Employing advanced email filtering and phishing detection to block malicious campaigns distributing TrustConnect payloads. 3) Monitoring network traffic for connections to known malicious domains and IP addresses associated with TrustConnect C2 infrastructure, using threat intelligence feeds to update detection rules. 4) Implementing application allowlisting to prevent unauthorized execution of unknown or suspicious MSI installers and payloads. 5) Enforcing least privilege principles for remote access tools and regularly auditing their usage and configurations. 6) Utilizing endpoint detection and response (EDR) solutions capable of identifying anomalous remote desktop activity and suspicious process behaviors related to RATs. 7) Educating IT and security teams about the risks of RMM abuse and indicators of TrustConnect infection. 8) Regularly updating and patching all software to reduce attack surface. 9) Employing multi-factor authentication (MFA) for all remote access portals to reduce risk of credential compromise. 10) Conducting threat hunting exercises focused on detecting RMM tool misuse and lateral movement patterns.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.proofpoint.com/us/blog/threat-insight/dont-trustconnect-its-a-rat"]
Adversary
null
Pulse Id
6996efa6c7a901cbcb67660e
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip192.159.99.83

Hash

ValueDescriptionCopy
hash3a0dc172a2e7c42ae356de489d4ee73c
hashbb8d4ead5c3099424d2718a0feb286ad
hash1c94d0497214be31621ae825d88d29195617a109
hashd8dc6c075e4efc9da65dfbd2f755a783a7455232
hash162c0d3e671ddf4f7f3ae5681da5272111eab6588bc53843cc604fc386634594
hashcee6895f7df01da489c10bf5b83770ceede79ed4e1c8c4f8ea9787a4d035c79b
hashcf85a4816715b8fa6c1eb5b50d1c70cfef116522742f6f1c77cb8689166b9f40

Url

ValueDescriptionCopy
urlhttp://192.159.99.83/Bin/ScreenConnect.ClientSetup.msi?e=Access&y=Guest
urlhttp://192.227.211.41:8040/Bin/ScreenConnect.ClientSetup.msi?e=Access&y=Guest
urlhttp://aerobickarlaurbanovas.top/Bin/ScreenConnect.ClientSetup.msi?e=Access&y=Guest=
urlhttp://memphiswawu.com/Bin/ScreenConnect.ClientSetup.msi?e=Access&y=Guest
urlhttp://smallmartdirectintense.com/Bin/ScreenConnect.ClientSetup.msi?e=Access&y=Guest=
urlhttp://stewise.top/Bin/ScreenConnect.ClientSetup.msi?e=Access&y=Guest

Domain

ValueDescriptionCopy
domainaerobickarlaurbanovas.top
domainametax.net
domainelev8souvenirs.com
domainmemphiswawu.com
domainnetworkservice.cyou
domainsmallmartdirectintense.com
domainstatementstview.online
domainstewise.top
domainvurul.click
domainadobe.caladzy.com

Threat ID: 69970717b557332a80d468cb

Added to database: 2/19/2026, 12:50:31 PM

Last enriched: 2/19/2026, 1:06:09 PM

Last updated: 2/20/2026, 12:29:37 AM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats