What RAT features do you actually use/need?
by b0mb3r - Tuesday April 1, 2025 at 08:10 AM
#1
I was playing around with XWorm RAT lately in my test-env and i was pretty stunned bout how much features XWorm has. So my question to you is:

- What features do you actually use ?
- What features do you wish would RATs have?
Reply
#2
(Apr 01, 2025, 08:10 AM)b0mb3r Wrote: I was playing around with XWorm RAT lately in my test-env and i was pretty stunned bout how much features XWorm has. So my question to you is:

- What features do you actually use ?
- What features do you wish would RATs have?

What features are necessary? Well the connection obviously LOL. Kind of a vague question, anything else is just so it sells better or is easier to use or such.
Thank you for ranks @ Al-Sheikh and @ 5150 !
Reply
#3
(Apr 01, 2025, 08:35 AM)302 Wrote:
(Apr 01, 2025, 08:10 AM)b0mb3r Wrote: I was playing around with XWorm RAT lately in my test-env and i was pretty stunned bout how much features XWorm has. So my question to you is:

- What features do you actually use ?
- What features do you wish would RATs have?

What features are necessary? Well the connection obviously LOL. Kind of a vague question, anything else is just so it sells better or is easier to use or such.

Yeah should've mentioned "Apart from the obivous" lmao.
Reply
#4
(Apr 01, 2025, 08:10 AM)b0mb3r Wrote: I was playing around with XWorm RAT lately in my test-env and i was pretty stunned bout how much features XWorm has. So my question to you is:

- What features do you actually use ?
- What features do you wish would RATs have?

I think XWorm does have all that you need.
Basically,from a RAT I expect:
-Persistency
-Anti-virus escaping
-remote command execution
-Admin mode/UAC disable
-Escape plan.

Maybe the only thing maybe Xworm lacks is the escape plan.

BTW,how you managed to get the source code? I have it too,but I struggled A LOT to find it and then I did on a discord channel.
Apart from that,I also found a built version on github,
I tested the builder in a VM,noticing what the process did,if it could harm my VM,if he spawns network connection to foreign server,and stuff like that and everything was looking fine.
Then I reverse engineered the .exe builder file using dnSPY and I was pretty amazed:
No code obfuscation,no strange strings,no registry key created,I took a look at the DLL it loads too and they looks clean.
I could confirm that was just the builder. Then did an analysis on the client it generated (the payload) and there was soon clear what it did (nasty things like connecting to the server,referenced a lot of windows type that a malaware needs).
Curious to know where you got source code. If you don't wanna telle me here,you can just DM me. Smile
Reply
#5
all you need is shell access anything beyond that is made solely for script kiddies and non-tech people
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  NEW USERS READ - how to avoid malware on the forum Sukob 104 12,849 5 hours ago
Last Post: Elowyn
  A collection of deepweb sites [2025] dg7ka 112 3,419 Yesterday, 07:57 PM
Last Post: IsItReal
  Hacking forums and their links 2026 onionlinks 1 270 Yesterday, 05:01 PM
Last Post: phas3lock
  What is your most efficent way to gain initial access? likju 1 198 Yesterday, 04:47 PM
Last Post: phas3lock
  FREE 3 UNCENSORED HACKING LLM QaboosbinSaidAlSaid 69 2,006 Yesterday, 04:37 PM
Last Post: phas3lock

Forum Jump:


 Users browsing this forum: 1 Guest(s)