Steaelite RAT
Information security researchers have uncovered a new Windows-based remote access trojan (RAT) known as Steaelite, first promoted on criminal forums in November 2025 as a 'best Windows RAT' offering so-called fully undetectable (FUD) capabilities. The malware is designed to operate seamlessly on both Windows 10 and Windows 11 environments, significantly expanding its potential victim base.
Table of Contents
A Unified Cybercrime Platform: Data Theft and Ransomware Combined
Unlike traditional off-the-shelf RATs marketed to cybercriminals, Steaelite consolidates multiple attack capabilities into a single, centralized web panel. Notably, it merges data theft operations and ransomware deployment into one integrated framework. An Android ransomware module is reportedly under development, signaling planned cross-platform expansion.
The management panel also embeds various developer-oriented utilities to streamline malicious operations, including:
- Keylogging functionality
- Real-time chat between attacker and victim
- File search capabilities
- USB-based propagation
- Desktop wallpaper modification
- User Account Control (UAC) bypass
- Clipper functionality targeting cryptocurrency transactions
This convergence of espionage, disruption, and monetization tools into one dashboard reflects a deliberate move toward operational efficiency for threat actors.
Defensive Evasion and Persistence Mechanisms
Steaelite incorporates aggressive evasion and system control features designed to maintain dominance over infected systems. These capabilities include the removal of competing malware, the disabling of Microsoft Defender, and the configuration of security exclusions to avoid detection. Persistence mechanisms ensure the malware survives system reboots and maintains long-term access.
Such built-in defensive countermeasures highlight a sophisticated understanding of endpoint security controls and incident response techniques.
Extensive Remote Control and Surveillance Capabilities
At its core, Steaelite delivers extensive remote administration and surveillance capabilities designed to give threat actors full control over compromised systems. The malware enables remote code execution and supports comprehensive file management, including arbitrary file execution. It facilitates live screen streaming, along with direct access to a victim's webcam and microphone, allowing real-time monitoring. In addition, it provides process management, clipboard monitoring, and password harvesting functionalities, while also enumerating installed programs and tracking device location. Operators can launch URLs remotely, conduct distributed denial-of-service (DDoS) attacks, and even compile VB.NET payloads directly through the platform.
All of these functions are orchestrated through a browser-based control panel that centralizes command over infected Windows machines. From this single interface, threat actors can carry out credential theft, exfiltrate sensitive files, conduct live surveillance, and deploy ransomware without requiring additional tools or infrastructure.
Enabling Streamlined Double Extortion Operations
Steaelite's architecture empowers a single threat actor to conduct full-spectrum intrusion activities without switching tools. Files can be browsed and exfiltrated, credentials harvested, and ransomware deployed from the same control panel.
This consolidation enables streamlined double-extortion campaigns, where stolen data is leveraged alongside encryption to maximize financial pressure on victims, all orchestrated through a single unified platform.