: It is particularly notorious for its ability to bypass Google Play Protect , as well as black screens used by banking and crypto apps to prevent screen capturing.
Craxs RAT is typically distributed through social engineering and phishing campaigns:
: The developer released Craxs RAT v7.5 in April 2024, which introduced even more robust obfuscation and stealth features. A successor or related variant known as G700 RAT has also been identified, targeting financial and cryptocurrency environments. Pricing and Availability craxs rat
: Attackers can view the device screen in real-time at up to 60 FPS, perform gestures, and use the device's keyboard.
: Silent recording of audio via the microphone, taking secret photos using both front and rear cameras, and tracking the device's live GPS location. : It is particularly notorious for its ability
Craxs RAT is a sophisticated and dangerous Remote Access Trojan (RAT) designed specifically for the Android operating system. Developed by a threat actor known as , who is believed to be based in Syria, it has evolved from the leaked source code of Spymax (also known as SpyNote). Today, it is sold as "Malware-as-a-Service" (MaaS) on platforms like Telegram, providing cybercriminals with advanced tools to completely hijack mobile devices. Core Capabilities and Features
The primary goal of Craxs RAT is to grant an attacker full remote control over an infected device. Its feature set includes: Pricing and Availability : Attackers can view the
The tool is marketed on specialized hacker forums and Telegram channels:
: Captures everything typed by the user and can scan the screen to steal secret phases from crypto wallets like Trust Wallet or bypass Google Authenticator codes. Deployment and Evolution
: Once installed, the malware uses Accessibility Services to grant itself extensive permissions automatically. It also employs anti-deletion mechanisms, such as closing the "Uninstall" or "Device Admin" screens if a user tries to access them.