NonEuclid: A Sophisticated Remote Access Trojan (RAT) Blending Evasion and Ransomware Capabilities

Cybersecurity experts have uncovered a new remote access trojan (RAT) named NonEuclid, which enables attackers to remotely control compromised Windows systems.

“NonEuclid, developed in C#, is a highly advanced malware that provides unauthorized remote access and employs sophisticated evasion techniques,” Cyfirma stated in a technical analysis published last week.

The RAT leverages a range of methods, including antivirus bypassing, privilege escalation, anti-detection mechanisms, and ransomware encryption targeting critical files.

First detected in underground forums in late November 2024, NonEuclid has been actively advertised as a crimeware solution. Discussions and tutorials about the malware have also surfaced on platforms like Discord and YouTube, signaling a deliberate effort to promote and distribute it.

Read More: Cyberattackers Seize Control of 16 Chrome Extensions, 600,000 Users Data at Risk

Core Functionality

NonEuclid initiates with a client application setup, followed by multiple anti-detection checks. Once these are completed, it establishes a TCP socket for communication with a designated IP address and port. The malware configures exclusions in Microsoft Defender Antivirus to evade detection and monitors processes such as “taskmgr.exe,” “processhacker.exe,” and “procexp.exe,” which are commonly used for process management and analysis.

“NonEuclid employs Windows API calls, such as CreateToolhelp32Snapshot, Process32First, and Process32Next, to enumerate active processes and match their names against specific targets,” Cyfirma noted. Based on the AntiProcessMode setting, it can either terminate these processes or cause the client application to exit.

Anti-Analysis and Evasion Techniques

The malware incorporates several anti-analysis strategies, including checks to detect virtual machines or sandboxed environments, terminating itself if such conditions are identified. It also bypasses the Windows Antimalware Scan Interface (AMSI) to avoid being flagged by security systems.

Persistence and Ransomware Features

NonEuclid maintains persistence through scheduled tasks and modifications to the Windows Registry. It also attempts to elevate privileges by bypassing User Account Control (UAC) protections to execute commands. Notably, it includes a ransomware component, encrypting files with extensions like .CSV, .TXT, and .PHP and appending them with the extension .NonEuclid.

Increasing Threat Sophistication

“NonEuclid represents the growing sophistication of modern malware, blending advanced stealth capabilities, anti-detection mechanisms, and ransomware functionalities,” Cyfirma explained. Its promotion across underground forums, Discord, and tutorial platforms underscores its appeal to cybercriminals and highlights the challenges in countering such threats.

With features like privilege escalation, AMSI bypass, and process termination, NonEuclid demonstrates a high level of adaptability in evading security defenses.

Zarnab Latif

Zarnab Latif is a versatile technical writer with a passion for demystifying the complexities of Artificial Intelligence (AI). She excels at creating clear, concise and user-friendly content that helps developers, engineers, and non-technical stakeholders understand and effectively utilize AI technologies.

Recent Posts

Top 10 Enterprise Tech Trends to Watch in 2026

Enterprise technology strategies in 2026 evolve from isolated initiatives into operationally critical systems that influence…

1 week ago

Task Management Apps: What Drives Adoption, Efficiency, and Results

The average knowledge worker uses more than 10 applications per day to complete their work.…

3 weeks ago

Modern Link Building Techniques for Authentic Online Authority

Building genuine online authority today requires more than just getting as many links as possible.…

2 months ago

Open-Source Log Analysis TUI: Discovering ControlTheory Gonzo from KubeCon 2025

Fresh from KubeCon + CloudNativeCon North America 2025 in Atlanta, I wanted to share one…

2 months ago

How to Redirect a URL Correctly

Redirects are one of those fundamentals that every web developer, marketer or technical person understands conceptually,…

2 months ago

SEO Trends Shaping Online Success in 2026

Key Takeaways AI-generated content and search experiences are reshaping the digital landscape, impacting how information…

4 months ago