What RAT features do you actually use/need?
by b0mb3r - Tuesday April 1, 2025 at 08:10 AM
#1
I was playing around with XWorm RAT lately in my test-env and i was pretty stunned bout how much features XWorm has. So my question to you is:

- What features do you actually use ?
- What features do you wish would RATs have?
Reply
#2
(04-01-2025, 08:10 AM)b0mb3r Wrote: I was playing around with XWorm RAT lately in my test-env and i was pretty stunned bout how much features XWorm has. So my question to you is:

- What features do you actually use ?
- What features do you wish would RATs have?

What features are necessary? Well the connection obviously LOL. Kind of a vague question, anything else is just so it sells better or is easier to use or such.
Thank you for ranks @ Al-Sheikh and @ 5150 !
Reply
#3
(04-01-2025, 08:35 AM)302 Wrote:
(04-01-2025, 08:10 AM)b0mb3r Wrote: I was playing around with XWorm RAT lately in my test-env and i was pretty stunned bout how much features XWorm has. So my question to you is:

- What features do you actually use ?
- What features do you wish would RATs have?

What features are necessary? Well the connection obviously LOL. Kind of a vague question, anything else is just so it sells better or is easier to use or such.

Yeah should've mentioned "Apart from the obivous" lmao.
Reply
#4
(04-01-2025, 08:10 AM)b0mb3r Wrote: I was playing around with XWorm RAT lately in my test-env and i was pretty stunned bout how much features XWorm has. So my question to you is:

- What features do you actually use ?
- What features do you wish would RATs have?

I think XWorm does have all that you need.
Basically,from a RAT I expect:
-Persistency
-Anti-virus escaping
-remote command execution
-Admin mode/UAC disable
-Escape plan.

Maybe the only thing maybe Xworm lacks is the escape plan.

BTW,how you managed to get the source code? I have it too,but I struggled A LOT to find it and then I did on a discord channel.
Apart from that,I also found a built version on github,
I tested the builder in a VM,noticing what the process did,if it could harm my VM,if he spawns network connection to foreign server,and stuff like that and everything was looking fine.
Then I reverse engineered the .exe builder file using dnSPY and I was pretty amazed:
No code obfuscation,no strange strings,no registry key created,I took a look at the DLL it loads too and they looks clean.
I could confirm that was just the builder. Then did an analysis on the client it generated (the payload) and there was soon clear what it did (nasty things like connecting to the server,referenced a lot of windows type that a malaware needs).
Curious to know where you got source code. If you don't wanna telle me here,you can just DM me. Smile
Reply
#5
all you need is shell access anything beyond that is made solely for script kiddies and non-tech people
Reply


Forum Jump:


 Users browsing this thread: