<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[i&#x27;ve got a new malware analysis describing what i have dubbed XorBee RAT]]></title><description><![CDATA[<p>i've got a new malware analysis describing what i have dubbed <code>XorBee RAT</code></p><ul><li>delivered by <a href="https://infosec.exchange/tags/kongtuke" rel="tag">#<span>kongtuke</span></a> via <a href="https://infosec.exchange/tags/clickfix" rel="tag">#<span>clickfix</span></a> </li><li>Python based</li><li>targets domain-joined Windows</li><li>uses port tcp/4444 for C2 traffic</li><li>obfuscates C2 traffic with XOR of the letter <code>b</code></li><li>continuously runs a thread checking for monitoring tools and exists if seen</li><li>after authenticating with C2, enters reverse shell</li><li>related to ModeloRAT</li><li>first seen in October 2025</li></ul><p></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://rmceoin.github.io/malware-analysis/2026/04/13/xorbee-rat.html" title="XorBee RAT">
<img src="https://rmceoin.github.io/malware-analysis/assets/images/xorbee/clickfix-example.png" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>































<div class="card-body">
<h5 class="card-title">
<a href="https://rmceoin.github.io/malware-analysis/2026/04/13/xorbee-rat.html">
XorBee RAT
</a>
</h5>
<p class="card-text line-clamp-3">A technical breakdown of XorBee RAT, a Python-based reverse shell deployed by the KongTuke threat actor via ClickFix social engineering against domain-joined Windows environments.</p>
</div>
<a href="https://rmceoin.github.io/malware-analysis/2026/04/13/xorbee-rat.html" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://rmceoin.github.io/favicon.ico" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />



<p class="d-inline-block text-truncate mb-0">Malware Analysis <span class="text-secondary">(rmceoin.github.io)</span></p>
</a>
</div><p></p><p><a href="https://infosec.exchange/tags/xorbee" rel="tag">#<span>xorbee</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/140cc88d-d636-415a-a43e-d296af848b79/i-ve-got-a-new-malware-analysis-describing-what-i-have-dubbed-xorbee-rat</link><generator>RSS for Node</generator><lastBuildDate>Thu, 30 Apr 2026 15:50:57 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/140cc88d-d636-415a-a43e-d296af848b79.rss" rel="self" type="application/rss+xml"/><pubDate>Mon, 13 Apr 2026 17:10:27 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to i&#x27;ve got a new malware analysis describing what i have dubbed XorBee RAT on Thu, 16 Apr 2026 20:04:25 GMT]]></title><description><![CDATA[<p><span><a href="/user/brandond%40infosec.exchange">@<span>BrandonD</span></a></span> i don't really know what their criteria is for the gateway url with the <code>/g</code> path.  they do seem to toggle it off for periods of time.  i speculate they only have it enabled during victim business hours and when they're on the clock, so to speak.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/rmceoin/statuses/116416175520604822</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/rmceoin/statuses/116416175520604822</guid><dc:creator><![CDATA[rmceoin@infosec.exchange]]></dc:creator><pubDate>Thu, 16 Apr 2026 20:04:25 GMT</pubDate></item><item><title><![CDATA[Reply to i&#x27;ve got a new malware analysis describing what i have dubbed XorBee RAT on Thu, 16 Apr 2026 19:58:23 GMT]]></title><description><![CDATA[<p><span><a href="/user/rmceoin%40infosec.exchange">@<span>rmceoin</span></a></span> Very interested if you get around to posting the logic they're using for when to display the ClickFix! </p><p>Seeing a compromised site that was reaching out to windlrr[.]com/file.js yesterday, now reaching out to a new initial C2: mermiston[.]com/file.js</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/BrandonD/statuses/116416151807326512</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/BrandonD/statuses/116416151807326512</guid><dc:creator><![CDATA[brandond@infosec.exchange]]></dc:creator><pubDate>Thu, 16 Apr 2026 19:58:23 GMT</pubDate></item><item><title><![CDATA[Reply to i&#x27;ve got a new malware analysis describing what i have dubbed XorBee RAT on Thu, 16 Apr 2026 19:02:01 GMT]]></title><description><![CDATA[<p><span><a href="/user/da_667%40infosec.exchange">@<span>da_667</span></a></span> ah! i just got around to noticing the <code>ET TROJAN XorBee RAT CnC Domain in DNS Lookup</code> rules.  those are actually <code>KongTuke</code> domains.  those may or may not lead you to <code>XorBee RAT</code>.  the RAT didn't use any domains, it only used IP's directly.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/rmceoin/statuses/116415930129006676</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/rmceoin/statuses/116415930129006676</guid><dc:creator><![CDATA[rmceoin@infosec.exchange]]></dc:creator><pubDate>Thu, 16 Apr 2026 19:02:01 GMT</pubDate></item><item><title><![CDATA[Reply to i&#x27;ve got a new malware analysis describing what i have dubbed XorBee RAT on Mon, 13 Apr 2026 18:26:53 GMT]]></title><description><![CDATA[<p><span><a href="/user/rmceoin%40infosec.exchange">@<span>rmceoin</span></a></span> python based on windows? curious that's a feasible tactic these days</p>]]></description><link>https://board.circlewithadot.net/post/https://social.treehouse.systems/users/astraleureka/statuses/116398805031937931</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://social.treehouse.systems/users/astraleureka/statuses/116398805031937931</guid><dc:creator><![CDATA[astraleureka@social.treehouse.systems]]></dc:creator><pubDate>Mon, 13 Apr 2026 18:26:53 GMT</pubDate></item><item><title><![CDATA[Reply to i&#x27;ve got a new malware analysis describing what i have dubbed XorBee RAT on Mon, 13 Apr 2026 18:02:26 GMT]]></title><description><![CDATA[<p><span><a href="/user/da_667%40infosec.exchange">@<span>da_667</span></a></span> yea!  i had a feeling you'd be able to chew on that</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/rmceoin/statuses/116398708912975316</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/rmceoin/statuses/116398708912975316</guid><dc:creator><![CDATA[rmceoin@infosec.exchange]]></dc:creator><pubDate>Mon, 13 Apr 2026 18:02:26 GMT</pubDate></item><item><title><![CDATA[Reply to i&#x27;ve got a new malware analysis describing what i have dubbed XorBee RAT on Mon, 13 Apr 2026 17:58:24 GMT]]></title><description><![CDATA[<p><span><a href="/user/rmceoin%40infosec.exchange">@<span>rmceoin</span></a></span> oh hey, that's something I can use. I'll include that in today's release as well. Thank you so much for sharing.</p><p><code>alert tcp-pkt $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"ET MALWARE XorBee RAT CNC Checkin M1"; flow:established,to_server; dsize:7;  content:"|09 07 1b 52 52 55 68|"; reference:url,rmceoin.github.io/malware-analysis/2026/04/13/xorbee-rat.html; classtype:trojan-activity; sid:1; rev:1;)</code></p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/da_667/statuses/116398693066481277</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/da_667/statuses/116398693066481277</guid><dc:creator><![CDATA[da_667@infosec.exchange]]></dc:creator><pubDate>Mon, 13 Apr 2026 17:58:24 GMT</pubDate></item><item><title><![CDATA[Reply to i&#x27;ve got a new malware analysis describing what i have dubbed XorBee RAT on Mon, 13 Apr 2026 17:53:06 GMT]]></title><description><![CDATA[<p><span><a href="/user/da_667%40infosec.exchange">@<span>da_667</span></a></span> cool!  nice to get an add to ETOPEN.  a quick check shows the C2 is still up.  fyi, the authentication packet should have the same data payload for any C2 IP, so when they move, this will be the same assuming the AUTH_KEY stays the same</p>

<div class="row mt-3"><div class="col-12 mt-3"><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/398/654/532/945/038/original/3c952c674d882814.png" alt="Link Preview Image" /><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/398/659/702/021/451/original/b15744b7eafbcd53.png" alt="Link Preview Image" /></div></div>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/rmceoin/statuses/116398672213935112</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/rmceoin/statuses/116398672213935112</guid><dc:creator><![CDATA[rmceoin@infosec.exchange]]></dc:creator><pubDate>Mon, 13 Apr 2026 17:53:06 GMT</pubDate></item><item><title><![CDATA[Reply to i&#x27;ve got a new malware analysis describing what i have dubbed XorBee RAT on Mon, 13 Apr 2026 17:42:16 GMT]]></title><description><![CDATA[<p><span><a href="/user/rmceoin%40infosec.exchange">@<span>rmceoin</span></a></span> can't see any sandbox results of the traffic, which sucks, but at the very least, I can grab the C2 and drop that into the ETOPEN ruleset for today's release. Thanks for sharing.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/da_667/statuses/116398629609232314</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/da_667/statuses/116398629609232314</guid><dc:creator><![CDATA[da_667@infosec.exchange]]></dc:creator><pubDate>Mon, 13 Apr 2026 17:42:16 GMT</pubDate></item><item><title><![CDATA[Reply to i&#x27;ve got a new malware analysis describing what i have dubbed XorBee RAT on Mon, 13 Apr 2026 17:31:45 GMT]]></title><description><![CDATA[<p><span><a href="/user/james_inthe_box%40infosec.exchange">@<span>james_inthe_box</span></a></span> thank you!  i saw it back in october and had fun with it, then saw it again last week and it sure seemed like nobody else had written it up.  i was overdue for a post on anything and this seemed like an interesting little beastie.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/rmceoin/statuses/116398588263593238</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/rmceoin/statuses/116398588263593238</guid><dc:creator><![CDATA[rmceoin@infosec.exchange]]></dc:creator><pubDate>Mon, 13 Apr 2026 17:31:45 GMT</pubDate></item><item><title><![CDATA[Reply to i&#x27;ve got a new malware analysis describing what i have dubbed XorBee RAT on Mon, 13 Apr 2026 17:13:35 GMT]]></title><description><![CDATA[<p><span><a href="https://infosec.exchange/@rmceoin">@<span>rmceoin</span></a></span> Nicely done.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/james_inthe_box/statuses/116398516847391092</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/james_inthe_box/statuses/116398516847391092</guid><dc:creator><![CDATA[james_inthe_box@infosec.exchange]]></dc:creator><pubDate>Mon, 13 Apr 2026 17:13:35 GMT</pubDate></item></channel></rss>