What RAT features do you actually use/need?
by b0mb3r - Tuesday April 1, 2025 at 08:10 AM
#1
I was playing around with XWorm RAT lately in my test-env and i was pretty stunned bout how much features XWorm has. So my question to you is:

- What features do you actually use ?
- What features do you wish would RATs have?
Reply
#2
(Apr 01, 2025, 08:10 AM)b0mb3r Wrote: I was playing around with XWorm RAT lately in my test-env and i was pretty stunned bout how much features XWorm has. So my question to you is:

- What features do you actually use ?
- What features do you wish would RATs have?

What features are necessary? Well the connection obviously LOL. Kind of a vague question, anything else is just so it sells better or is easier to use or such.
Thank you for ranks @ Al-Sheikh and @ 5150 !
Reply
#3
(Apr 01, 2025, 08:35 AM)302 Wrote:
(Apr 01, 2025, 08:10 AM)b0mb3r Wrote: I was playing around with XWorm RAT lately in my test-env and i was pretty stunned bout how much features XWorm has. So my question to you is:

- What features do you actually use ?
- What features do you wish would RATs have?

What features are necessary? Well the connection obviously LOL. Kind of a vague question, anything else is just so it sells better or is easier to use or such.

Yeah should've mentioned "Apart from the obivous" lmao.
Reply
#4
(Apr 01, 2025, 08:10 AM)b0mb3r Wrote: I was playing around with XWorm RAT lately in my test-env and i was pretty stunned bout how much features XWorm has. So my question to you is:

- What features do you actually use ?
- What features do you wish would RATs have?

I think XWorm does have all that you need.
Basically,from a RAT I expect:
-Persistency
-Anti-virus escaping
-remote command execution
-Admin mode/UAC disable
-Escape plan.

Maybe the only thing maybe Xworm lacks is the escape plan.

BTW,how you managed to get the source code? I have it too,but I struggled A LOT to find it and then I did on a discord channel.
Apart from that,I also found a built version on github,
I tested the builder in a VM,noticing what the process did,if it could harm my VM,if he spawns network connection to foreign server,and stuff like that and everything was looking fine.
Then I reverse engineered the .exe builder file using dnSPY and I was pretty amazed:
No code obfuscation,no strange strings,no registry key created,I took a look at the DLL it loads too and they looks clean.
I could confirm that was just the builder. Then did an analysis on the client it generated (the payload) and there was soon clear what it did (nasty things like connecting to the server,referenced a lot of windows type that a malaware needs).
Curious to know where you got source code. If you don't wanna telle me here,you can just DM me. Smile
Reply
#5
all you need is shell access anything beyond that is made solely for script kiddies and non-tech people
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  A collection of deepweb sites [2025] dg7ka 104 2,609 Today, 02:54 AM
Last Post: idkwhateve9872
  Looking for experienced hacker 99992 0 131 Yesterday, 10:59 PM
Last Post: 99992
  I'M LOOKING FOR AN INTELX API orkidd 1 295 Apr 27, 2026, 05:16 PM
Last Post: orkidd
  Telegram Opsec Guide Synaptic 46 1,697 Apr 26, 2026, 12:43 PM
Last Post: 0xdarkdharma
  TOP SECRET FBI HACK BY KOMI komi 30 1,451 Apr 25, 2026, 02:59 PM
Last Post: insider100

Forum Jump:


 Users browsing this forum: 1 Guest(s)