Skip to content

SectopRAT

Also known as: 1xxbot, ArechClient

SectopRAT, aka ArechClient2, is a .NET RAT with numerous capabilities including multiple stealth functions. Arechclient2 can profile victim systems, steal information such as browser and crypto-wallet data, and launch a hidden secondary desktop to control browser sessions. Additionally, it has several anti-VM and anti-emulator capabilities.

C2 Infrastructure

Hosting/VPS73%
ISP/Residential27%

Last 7 days

Apr 14, 2026
C2 Hosts: 1
Apr 13, 2026
C2 Hosts: 2
Apr 12, 2026
C2 Hosts: 2
Apr 11, 2026
C2 Hosts: 5
Apr 8, 2026
C2 Hosts: 1

Further Reading

A Wretch Client: From ClickFix deception to information stealer deployment — Elastic Security Labs

Elastic Security Labs detected a surge in ClickFix campaigns, using GHOSTPULSE to deploy Remote Access Trojans and data-stealing malware.

elastic.co
GHOSTPULSE haunts victims using defense evasion bag o' tricks — Elastic Security Labs

Elastic Security Labs reveals details of a new campaign leveraging defense evasion capabilities to infect victims with malicious MSIX executables.

elastic.co
New SectopRAT: Remote access malware utilizes second desktop to control browsers

This new remote access malware creates a second desktop that is invisible to the system's user. The threat actor can surf the Internet using the infected machine.

gdatasoftware.com
SecTopRAT: Updates and Encrypted C2 communications

A recently discovered version of SecTopRAT adds encrypted C2 communications as well as several new commands - a clear sign that this malware is under active development. Learn more on the G DATA Blog!

gdatasoftware.com
Fake Update Utilizes New IDAT Loader To Execute StealC and Lumma Infostealers | Rapid7 Blog

Rapid7 has observed the Fake Browser Update lure utilizing a sophisticated new loader to execute infostealers.

rapid7.com
Rewterz Threat Alert – Widely Abused MSIX App Installer Disabled by Microsoft – Active IOCs - Rewterz

Severity High Analysis Summary Microsoft stated that it is disabling the ms-appinstaller protocol handler again after various threat actors exploited it as an initial access vector to distribute ma...

rewterz.com