ATROPOSIA

Advanced Remote Access Trojan — a multifunctional architecture equipped with unique capabilities.

Dashboard overview
Builder flow
Encryption module
Plugins manager

Dashboard — at-a-glance metrics, sessions, and quick actions.

Key Features

A set of practical tools with unique features — fast, stealthy and extensible.

Encrypted Communication

Secure connection and data exchange

Client Management

Accounting for connected devices: IP, OS, host, country, rights..

C2 Console

Remote command execution with stealth, ensuring persistence through hidden processes.

Remote Desktop

Fluid remote desktop with adaptive screen capture and quality management.

File Manager

Browse directories, copy, download, and delete files..

Clipboard Manager

Monitoring and management of the client's clipboard.

Process Manager

Full process control: detailed listing with kill, suspend, and resume capabilities.

PacketFlight

TCP/UDP connection tracking and process management.

System Control

Remote shutdown, restart, and sleep of the client.

System Information

Collecting information about the OS, CPU, RAM, IP,Privileges..

Grabber

Search and collect files by filters and ZIP archiving.

Stealer

Targeted theft of passwords, crypto wallet and messenger data.

Vulnerability Scanner

Vulnerability audit, exploit search, report.

UAC Bypass

Privilege escalation via automatic UAC bypass.

DNS Hijack

Redirects DNS queries to counterfeit websites for credential theft or content substitution.

Execute File

Stealthy file execution and process injection capabilities.

Mass Execute

Mass execution of file launches on multiple users.

HRDP Connect

Stealth RDP Session: Establish a hidden remote desktop session with full, undetectable system control.

Persistence

Anchoring in the system by different methods

Mutex

Protection against reopening

Native

Fully native stubs: no dependencies, run on a "clean" system.

Client Control

Client control: shutdown and restart.

Mass Connect

Unlimited number of connections

Audit & Logs

Output of errors, reports, and actions.

Server Settings

Port management, server start and stop.

Unique Stubs

Each build is unique

Stubs Type

Several types of stubs

Modules

Separate modules, can run as a separate .exe

MPR (Compression)

Payload compression, with minimal signatures.

Themes

Selection and customization of the UI themes

Deep Dive

A more detailed description of the functions.

1 Core & Security — maximum protection and stealth
  • Languages: C++/Rust.
  • Encrypted Communication: All data exchanged between the client and server is securely encrypted for maximum confidentiality.
  • Unique Stubs: Each generated client is unique.
  • Native Stubs: Standalone executables with no external dependencies, capable of running on a clean Windows system.
  • Mutex Protection: Prevents multiple instances of the client from running on the same machine.
  • UAC Bypass: Automatic privilege escalation to gain Administrator rights by bypassing User Account Control.
  • Persistence: Ensures the client remains active on the target system through various auto-start methods.
2 Client Management & Control — centralized administration
  • Centralized Client Management: Intuitive console for managing all connected clients with details like IP, OS, Hostname, Country, and User Privileges.
  • Mass Connectivity: Support for an unlimited number of simultaneous client connections.
  • Client Control: Remotely shut down, restart, or disconnect specific clients.
  • Mass Execute: Execute commands or launch files on multiple selected clients simultaneously.
3 Remote Surveillance & Control — complete system oversight
  • Remote Desktop: Real-time desktop viewing with adaptive screen capture and adjustable quality for a fluid experience.
  • HRDP Connect (Hidden RDP): Establishes a stealth remote desktop session that is undetectable by the user.
  • File Manager: Full file system exploration with capabilities to upload, download, delete, copy, and execute files.
  • Process Manager: View, terminate, suspend, or resume running processes with detailed information.
  • System Control: Remotely shut down, restart, or put the client computer to sleep.
4 Data Extraction & Theft — targeted information gathering
  • Stealer Module: Targeted extraction of sensitive data including saved passwords, cryptocurrency wallets, and messenger histories.
  • Grabber Module: Search for and collect specific file types (by extension) with automatic ZIP archiving for exfiltration.
  • Clipboard Manager: Monitor and manage the contents of the client's clipboard in real-time.
  • Execute File: Stealthy execution of files and injection into running processes.
5 Network & Security Tools — advanced network control
  • PacketFlight: Monitor and manage TCP/UDP connections, identifying associated processes.
  • DNS Hijack: Redirect DNS queries to controlled servers for credential phishing or content substitution.
  • Vulnerability Scanner: Conduct a local audit of the client system to identify security vulnerabilities and generate reports.
6 Server & Customization — flexible infrastructure
  • C2 Console: Centralized interface for executing commands and managing the infrastructure.
  • Server Settings: Easy management of server ports, start/stop functionality, and connection logs.
  • Audit & Logs: Comprehensive logging of all actions, errors, and reports for analysis.
  • Modular Architecture: Capability to run specific functions (like Grabber or Stealer) as separate, standalone executables.
  • MPR (Compression): Advanced payload compression to reduce size and minimize detection signatures.
  • UI Themes: Customizable console interface with a selection of visual themes.

Video Overview

See it in action

Quick walkthrough of the workflow: building, encrypting, and extending with plugins — in a clean, unified UI.

Pricing

Simple packages.

Monthly

Flexible
$200/ month
Pay-as-you-go
All features
Regular support

3 Months

Save ~17%
$500/ 3 months
≈ $167 / month
All features
Priority support

Support

Telegram: @Melatonin_Support Open Telegram