Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

rmceoin@infosec.exchangeR

rmceoin@infosec.exchange

@rmceoin@infosec.exchange
About
Posts
6
Topics
1
Shares
0
Groups
0
Followers
0
Following
0

View Original

Posts

Recent Best Controversial

  • i've got a new malware analysis describing what i have dubbed XorBee RAT
    rmceoin@infosec.exchangeR rmceoin@infosec.exchange

    @BrandonD i don't really know what their criteria is for the gateway url with the /g path. they do seem to toggle it off for periods of time. i speculate they only have it enabled during victim business hours and when they're on the clock, so to speak.

    Uncategorized kongtuke clickfix xorbee

  • i've got a new malware analysis describing what i have dubbed XorBee RAT
    rmceoin@infosec.exchangeR rmceoin@infosec.exchange

    @da_667 ah! i just got around to noticing the ET TROJAN XorBee RAT CnC Domain in DNS Lookup rules. those are actually KongTuke domains. those may or may not lead you to XorBee RAT. the RAT didn't use any domains, it only used IP's directly.

    Uncategorized kongtuke clickfix xorbee

  • i've got a new malware analysis describing what i have dubbed XorBee RAT
    rmceoin@infosec.exchangeR rmceoin@infosec.exchange

    @da_667 yea! i had a feeling you'd be able to chew on that

    Uncategorized kongtuke clickfix xorbee

  • i've got a new malware analysis describing what i have dubbed XorBee RAT
    rmceoin@infosec.exchangeR rmceoin@infosec.exchange

    @da_667 cool! nice to get an add to ETOPEN. a quick check shows the C2 is still up. fyi, the authentication packet should have the same data payload for any C2 IP, so when they move, this will be the same assuming the AUTH_KEY stays the same

    Link Preview ImageLink Preview Image
    Uncategorized kongtuke clickfix xorbee

  • i've got a new malware analysis describing what i have dubbed XorBee RAT
    rmceoin@infosec.exchangeR rmceoin@infosec.exchange

    @james_inthe_box thank you! i saw it back in october and had fun with it, then saw it again last week and it sure seemed like nobody else had written it up. i was overdue for a post on anything and this seemed like an interesting little beastie.

    Uncategorized kongtuke clickfix xorbee

  • i've got a new malware analysis describing what i have dubbed XorBee RAT
    rmceoin@infosec.exchangeR rmceoin@infosec.exchange

    i've got a new malware analysis describing what i have dubbed XorBee RAT

    • delivered by #kongtuke via #clickfix
    • Python based
    • targets domain-joined Windows
    • uses port tcp/4444 for C2 traffic
    • obfuscates C2 traffic with XOR of the letter b
    • continuously runs a thread checking for monitoring tools and exists if seen
    • after authenticating with C2, enters reverse shell
    • related to ModeloRAT
    • first seen in October 2025

    Link Preview Image
    XorBee RAT

    A technical breakdown of XorBee RAT, a Python-based reverse shell deployed by the KongTuke threat actor via ClickFix social engineering against domain-joined Windows environments.

    favicon

    Malware Analysis (rmceoin.github.io)

    #xorbee

    Uncategorized kongtuke clickfix xorbee
  • Login

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups