Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. i've got a new malware analysis describing what i have dubbed XorBee RAT

i've got a new malware analysis describing what i have dubbed XorBee RAT

Scheduled Pinned Locked Moved Uncategorized
kongtukeclickfixxorbee
11 Posts 5 Posters 4 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • rmceoin@infosec.exchangeR rmceoin@infosec.exchange

    i've got a new malware analysis describing what i have dubbed XorBee RAT

    • delivered by #kongtuke via #clickfix
    • Python based
    • targets domain-joined Windows
    • uses port tcp/4444 for C2 traffic
    • obfuscates C2 traffic with XOR of the letter b
    • continuously runs a thread checking for monitoring tools and exists if seen
    • after authenticating with C2, enters reverse shell
    • related to ModeloRAT
    • first seen in October 2025

    Link Preview Image
    XorBee RAT

    A technical breakdown of XorBee RAT, a Python-based reverse shell deployed by the KongTuke threat actor via ClickFix social engineering against domain-joined Windows environments.

    favicon

    Malware Analysis (rmceoin.github.io)

    #xorbee

    james_inthe_box@infosec.exchangeJ This user is from outside of this forum
    james_inthe_box@infosec.exchangeJ This user is from outside of this forum
    james_inthe_box@infosec.exchange
    wrote last edited by
    #2

    @rmceoin Nicely done.

    rmceoin@infosec.exchangeR 1 Reply Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    • james_inthe_box@infosec.exchangeJ james_inthe_box@infosec.exchange

      @rmceoin Nicely done.

      rmceoin@infosec.exchangeR This user is from outside of this forum
      rmceoin@infosec.exchangeR This user is from outside of this forum
      rmceoin@infosec.exchange
      wrote last edited by
      #3

      @james_inthe_box thank you! i saw it back in october and had fun with it, then saw it again last week and it sure seemed like nobody else had written it up. i was overdue for a post on anything and this seemed like an interesting little beastie.

      1 Reply Last reply
      0
      • rmceoin@infosec.exchangeR rmceoin@infosec.exchange

        i've got a new malware analysis describing what i have dubbed XorBee RAT

        • delivered by #kongtuke via #clickfix
        • Python based
        • targets domain-joined Windows
        • uses port tcp/4444 for C2 traffic
        • obfuscates C2 traffic with XOR of the letter b
        • continuously runs a thread checking for monitoring tools and exists if seen
        • after authenticating with C2, enters reverse shell
        • related to ModeloRAT
        • first seen in October 2025

        Link Preview Image
        XorBee RAT

        A technical breakdown of XorBee RAT, a Python-based reverse shell deployed by the KongTuke threat actor via ClickFix social engineering against domain-joined Windows environments.

        favicon

        Malware Analysis (rmceoin.github.io)

        #xorbee

        da_667@infosec.exchangeD This user is from outside of this forum
        da_667@infosec.exchangeD This user is from outside of this forum
        da_667@infosec.exchange
        wrote last edited by
        #4

        @rmceoin can't see any sandbox results of the traffic, which sucks, but at the very least, I can grab the C2 and drop that into the ETOPEN ruleset for today's release. Thanks for sharing.

        rmceoin@infosec.exchangeR 2 Replies Last reply
        0
        • da_667@infosec.exchangeD da_667@infosec.exchange

          @rmceoin can't see any sandbox results of the traffic, which sucks, but at the very least, I can grab the C2 and drop that into the ETOPEN ruleset for today's release. Thanks for sharing.

          rmceoin@infosec.exchangeR This user is from outside of this forum
          rmceoin@infosec.exchangeR This user is from outside of this forum
          rmceoin@infosec.exchange
          wrote last edited by
          #5

          @da_667 cool! nice to get an add to ETOPEN. a quick check shows the C2 is still up. fyi, the authentication packet should have the same data payload for any C2 IP, so when they move, this will be the same assuming the AUTH_KEY stays the same

          Link Preview ImageLink Preview Image
          da_667@infosec.exchangeD 1 Reply Last reply
          0
          • rmceoin@infosec.exchangeR rmceoin@infosec.exchange

            @da_667 cool! nice to get an add to ETOPEN. a quick check shows the C2 is still up. fyi, the authentication packet should have the same data payload for any C2 IP, so when they move, this will be the same assuming the AUTH_KEY stays the same

            Link Preview ImageLink Preview Image
            da_667@infosec.exchangeD This user is from outside of this forum
            da_667@infosec.exchangeD This user is from outside of this forum
            da_667@infosec.exchange
            wrote last edited by
            #6

            @rmceoin oh hey, that's something I can use. I'll include that in today's release as well. Thank you so much for sharing.

            alert tcp-pkt $HOME_NET any -> $EXTERNAL_NET any (msg:"ET MALWARE XorBee RAT CNC Checkin M1"; flow:established,to_server; dsize:7; content:"|09 07 1b 52 52 55 68|"; reference:url,rmceoin.github.io/malware-analysis/2026/04/13/xorbee-rat.html; classtype:trojan-activity; sid:1; rev:1;)

            rmceoin@infosec.exchangeR 1 Reply Last reply
            0
            • da_667@infosec.exchangeD da_667@infosec.exchange

              @rmceoin oh hey, that's something I can use. I'll include that in today's release as well. Thank you so much for sharing.

              alert tcp-pkt $HOME_NET any -> $EXTERNAL_NET any (msg:"ET MALWARE XorBee RAT CNC Checkin M1"; flow:established,to_server; dsize:7; content:"|09 07 1b 52 52 55 68|"; reference:url,rmceoin.github.io/malware-analysis/2026/04/13/xorbee-rat.html; classtype:trojan-activity; sid:1; rev:1;)

              rmceoin@infosec.exchangeR This user is from outside of this forum
              rmceoin@infosec.exchangeR This user is from outside of this forum
              rmceoin@infosec.exchange
              wrote last edited by
              #7

              @da_667 yea! i had a feeling you'd be able to chew on that

              1 Reply Last reply
              0
              • rmceoin@infosec.exchangeR rmceoin@infosec.exchange

                i've got a new malware analysis describing what i have dubbed XorBee RAT

                • delivered by #kongtuke via #clickfix
                • Python based
                • targets domain-joined Windows
                • uses port tcp/4444 for C2 traffic
                • obfuscates C2 traffic with XOR of the letter b
                • continuously runs a thread checking for monitoring tools and exists if seen
                • after authenticating with C2, enters reverse shell
                • related to ModeloRAT
                • first seen in October 2025

                Link Preview Image
                XorBee RAT

                A technical breakdown of XorBee RAT, a Python-based reverse shell deployed by the KongTuke threat actor via ClickFix social engineering against domain-joined Windows environments.

                favicon

                Malware Analysis (rmceoin.github.io)

                #xorbee

                astraleureka@social.treehouse.systemsA This user is from outside of this forum
                astraleureka@social.treehouse.systemsA This user is from outside of this forum
                astraleureka@social.treehouse.systems
                wrote last edited by
                #8

                @rmceoin python based on windows? curious that's a feasible tactic these days

                1 Reply Last reply
                0
                • da_667@infosec.exchangeD da_667@infosec.exchange

                  @rmceoin can't see any sandbox results of the traffic, which sucks, but at the very least, I can grab the C2 and drop that into the ETOPEN ruleset for today's release. Thanks for sharing.

                  rmceoin@infosec.exchangeR This user is from outside of this forum
                  rmceoin@infosec.exchangeR This user is from outside of this forum
                  rmceoin@infosec.exchange
                  wrote last edited by
                  #9

                  @da_667 ah! i just got around to noticing the ET TROJAN XorBee RAT CnC Domain in DNS Lookup rules. those are actually KongTuke domains. those may or may not lead you to XorBee RAT. the RAT didn't use any domains, it only used IP's directly.

                  1 Reply Last reply
                  1
                  0
                  • rmceoin@infosec.exchangeR rmceoin@infosec.exchange

                    i've got a new malware analysis describing what i have dubbed XorBee RAT

                    • delivered by #kongtuke via #clickfix
                    • Python based
                    • targets domain-joined Windows
                    • uses port tcp/4444 for C2 traffic
                    • obfuscates C2 traffic with XOR of the letter b
                    • continuously runs a thread checking for monitoring tools and exists if seen
                    • after authenticating with C2, enters reverse shell
                    • related to ModeloRAT
                    • first seen in October 2025

                    Link Preview Image
                    XorBee RAT

                    A technical breakdown of XorBee RAT, a Python-based reverse shell deployed by the KongTuke threat actor via ClickFix social engineering against domain-joined Windows environments.

                    favicon

                    Malware Analysis (rmceoin.github.io)

                    #xorbee

                    B This user is from outside of this forum
                    B This user is from outside of this forum
                    brandond@infosec.exchange
                    wrote last edited by
                    #10

                    @rmceoin Very interested if you get around to posting the logic they're using for when to display the ClickFix!

                    Seeing a compromised site that was reaching out to windlrr[.]com/file.js yesterday, now reaching out to a new initial C2: mermiston[.]com/file.js

                    rmceoin@infosec.exchangeR 1 Reply Last reply
                    1
                    0
                    • B brandond@infosec.exchange

                      @rmceoin Very interested if you get around to posting the logic they're using for when to display the ClickFix!

                      Seeing a compromised site that was reaching out to windlrr[.]com/file.js yesterday, now reaching out to a new initial C2: mermiston[.]com/file.js

                      rmceoin@infosec.exchangeR This user is from outside of this forum
                      rmceoin@infosec.exchangeR This user is from outside of this forum
                      rmceoin@infosec.exchange
                      wrote last edited by
                      #11

                      @BrandonD i don't really know what their criteria is for the gateway url with the /g path. they do seem to toggle it off for periods of time. i speculate they only have it enabled during victim business hours and when they're on the clock, so to speak.

                      1 Reply Last reply
                      1
                      0
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups