What's new
Runion

This is a sample guest message. Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

What's the best RAT? (async rat, remcos, .. )

Vecna9

Midle Weight
Депозит
$0
Hi there!

I'd like to get back into RATs but it's been a while since I've been into this thing.

What do you recommend as a RAT? (async rat, remcos, private RATs)

Do you have any good techniques for making money with RATs?
 
Hello and welcome.
This question has become very popular nowadays simply because there are tons of tools available. However, I want to emphasize that all tools are merely bridges to achieving a successful operation. Remember, there is no greatest tool, but rather the greatest minds behind their utilization.
 
If we are talking about public and at the same time good RATs there is probably nothing better than remcos for cheap. Don't waste your time with free malware its often unfinished and unstable.
 
Vecna9 сказал(а):
Hi there!

I'd like to get back into RATs but it's been a while since I've been into this thing.

What do you recommend as a RAT? (async rat, remcos, private RATs)

Do you have any good techniques for making money with RATs?
Нажмите, чтобы раскрыть...
i recommend private Rat's + HVNC if you want make real money from rats but still async rat is good also Quasar rat is good
 
Wiz сказал(а):
Hello and welcome.
This question has become very popular nowadays simply because there are tons of tools available. However, I want to emphasize that all tools are merely bridges to achieving a successful operation. Remember, there is no greatest tool, but rather the greatest minds behind their utilization.
Нажмите, чтобы раскрыть...
I agree with you, as most of the RATs do the same birch tree with some functionality.
But it's still important to choose a quality RAT.
 
Why expending money on something that will create on your process a bunch of RWX privileges memory, is hard to crypt and is written by who ever know?

Stick to a well known c2 framework like Cobalt, Havoc, Sliver, Brute Ratel, Merlin. Learn to operate and find a good packer/shellcode loader.

Save money for other purposes, most of the can be find cracked over the internet/forum and others are open source (Havoc, Sliver, Merlin)

For HVNC there are many other options where you can load them with execution-assembly if they are a BOF from cobalt strike for example. If not you can add exclusions and drop another rat with HVNC purposes. HVNCs are very noisy, they send hundreds of http get post request so watch out.

It is difficult to work on encryption with this basic and unsafe tools, the best and technically more professional method is to generate shellcode and from there executes and load into memory. You can spawn new process, inject into others. Work with dlls... The limit is the sky.

Try to look on the tools I have mentioned, all of them, figure out the standar c2 framework tools. Have a look into what is a shellcode reflective loader and how to operate with it, start with the basic, there are videos and info everywhere.

Good luck and I recommend you to learn a little bit of code. At least understand the principles.
 
домкрат сказал(а):
Why expending money on something that will create on your process a bunch of RWX privileges memory, is hard to crypt and is written by who ever know?
Нажмите, чтобы раскрыть...
You're probably misunderstanding this thread, command and control frameworks are not RATs, they have a completely different usage (especially HVNCs)

Normally RATs are programmed using C# with uses CLR, it is totally fine have RWX memory maps, since it has a JIT engine and JIT engines uses RWX a lot.

From my perspective, is a lot better use a software designed to what you're looking for instead of a software with a lot of abstractions.

OBS: A lot of other C2 are very unstable with CLR loading and executing (especially cobalt strike) they wait for the result of command and make the beacon unstable after sometime because they wait for output but there is no output.

домкрат сказал(а):
For HVNC there are many other options where you can load them with execution-assembly if they are a BOF from cobalt strike for example. If not you can add exclusions and drop another rat with HVNC purposes. HVNCs are very noisy, they send hundreds of http get post request so watch out.
Нажмите, чтобы раскрыть...
This is very relative, for example quasar rat does not use HTTP(s) to send screen buffers, it uses TCP.

домкрат сказал(а):
It is difficult to work on encryption with this basic and unsafe tools
Нажмите, чтобы раскрыть...
Again, relative, C# binaries (without dependencies) are very easy to crypt (crypters are useless now days anyways)

OBS: Public source command and control frameworks have a lot of known TTPs (meaning that will be easy to detect), one example is sleep obfuscation from havoc.

Stop spraying misinformation to users :p
 
s0nus сказал(а):
You're probably misunderstanding this thread, command and control frameworks are not RATs, they have a completely different usage (especially HVNCs)

Normally RATs are programmed using C# with uses CLR, it is totally fine have RWX memory maps, since it has a JIT engine and JIT engines uses RWX a lot.

From my perspective, is a lot better use a software designed to what you're looking for instead of a software with a lot of abstractions.

OBS: A lot of other C2 are very unstable with CLR loading and executing (especially cobalt strike) they wait for the result of command and make the beacon unstable after sometime because they wait for output but there is no output.
Нажмите, чтобы раскрыть...

Honesly I didnt see any good recomendation :p I will try one by your good words. I stick for what works well for me, so I just can recommend this toolset, under my point of view, you just need a little code knowledge to develop your own stealer + hvnc functions apart from your initial access.

You are right, is good to save time and stick to full operative tools but at the end you need a crypt/packer so you can save this money and invest here which is the really main important deal. To get an initial access.

s0nus сказал(а):
This is very relative, for example quasar rat does not use HTTP(s) to send screen buffers, it uses TCP.
Нажмите, чтобы раскрыть...

I prefer to blend the traffic but oh well...

s0nus сказал(а):
Again, relative, C# binaries (without dependencies) are very easy to crypt (crypters are useless now days anyways)

OBS: Public source command and control frameworks have a lot of known TTPs (meaning that will be easy to detect), one example is sleep obfuscation from havoc.

Stop spraying misinformation to users :p
Нажмите, чтобы раскрыть...

You are true with that, actually these frameworks have lot of them but with a little bit of care and love are easy to modify them.

Peace and love brother, just explaining the fella where to save money and gain knowledge! I would accept a good suggestion by you
 
домкрат сказал(а):
Honesly I didnt see any good recomendation :p I will try one by your good words. I stick for what works well for me, so I just can recommend this toolset, under my point of view, you just need a little code knowledge to develop your own stealer + hvnc functions apart from your initial access.
Нажмите, чтобы раскрыть...
Depending on the operation, zero stage command and control frameworks could be used before dropping the HVNC or RAT, doing less noise and preserving the access.

Create your own stealer or hvnc is great too, but take a lot of time and effort, and doesn't looks like the people on this thread wanna to.

домкрат сказал(а):
You are right, is good to save time and stick to full operative tools but at the end you need a crypt/packer so you can save this money and invest here which is the really main important deal. To get an initial access.
Нажмите, чтобы раскрыть...
This depends on the tool to be honest, for example, lumma stealer (or lumma c2) could be run without crypters/packers, since they designed their code in a way that it is fud.

Crypters and packers are pretty much useless (at least from my point of view), since the original binary being runned in memory could be easily detected because of malware behavior.

домкрат сказал(а):
I prefer to blend the traffic but oh well...
Нажмите, чтобы раскрыть...
Me too, but thinking better, TCP is a lot more reliable and fast compared to sending a lot of HTTP(s) requests (an rat using websocket would be great :0)

домкрат сказал(а):
You are true with that, actually these frameworks have lot of them but with a little bit of care and love are easy to modify them.
Нажмите, чтобы раскрыть...
Would be a lot better use something already "fud", that doesn't have detections (like a private stub or smth like that) from RATs/HVNCs like brute ratel
 
s0nus сказал(а):
Depending on the operation, zero stage command and control frameworks could be used before dropping the HVNC or RAT, doing less noise and preserving the access.

Create your own stealer or hvnc is great too, but take a lot of time and effort, and doesn't looks like the people on this thread wanna to.
Нажмите, чтобы раскрыть...

Absolutely yes, for me I have not encountered any problem from getting persistance and upgrading to an elevate session, but at the beggining I was getting caught with the UAC bypasses :p

You can use code from other projects but yes, it is a lot of time consuming.

s0nus сказал(а):
This depends on the tool to be honest, for example, lumma stealer (or lumma c2) could be run without crypters/packers, since they designed their code in a way that it is fud.

Crypters and packers are pretty much useless (at least from my point of view), since the original binary being runned in memory could be easily detected because of malware behavior.
Нажмите, чтобы раскрыть...

I didn't know that, have you tested it on ESET or AVIRA? I assume it is on WD?

Sorry for my bad explanation, I wanted to say reflctive shellcode loader, you can play with your og binary too: sgn, mac addresses...

s0nus сказал(а):
Me too, but thinking better, TCP is a lot more reliable and fast compared to sending a lot of HTTP(s) requests (an rat using websocket would be great :0)
Нажмите, чтобы раскрыть...

Never tested the behavioral of a TCP conexion under a spawned new process or injection into another. I don't know on runtime how it would see :(

s0nus сказал(а):
Would be a lot better use something already "fud", that doesn't have detections (like a private stub or smth like that) from RATs/HVNCs like brute ratel
Нажмите, чтобы раскрыть...

Well if its exist ands its cheap it its good, you save lot of time for sure, but... how much time have to be paying for that? Would be fud with low prices and lot of people spaming it without prior knowledge?

Wanted to test latest brute ratel but seems that not many people have access to it, looks great btw.
 
Top