# Vxer is offering Cobian RAT in the underground, but it is backdoored **[securityaffairs.co/wordpress/62573/malware/cobian-rat-backdoor.html](https://securityaffairs.co/wordpress/62573/malware/cobian-rat-backdoor.html)** September 1, 2017 September 1, 2017 By [Pierluigi Paganini](https://securityaffairs.co/wordpress/author/paganinip) ## Malware writer is offering for free a malware dubbed Cobian RAT in the underground, but the malicious code hides an ugly surprise. In the [dark web, it is quite easy to find alone vxers and hacking forums that offer malware](http://securityaffairs.co/wordpress/61206/cyber-crime/alphabay-hansa-shutdown.html) and customize them according to buyers’ needs. Recently researchers from Zscaler have spotted a remote access trojan dubbed Cobian remote RAT that was offered for free in the underground. It is fairly elemental malicious code based on an old RAT known as [njRAT, it implements common spying features such as](http://securityaffairs.co/wordpress/37430/cyber-crime/njrat-campaign-fakeav.html) keylogger, webcam hijacker, screen capturing and of course the ability to execute attackers’ code on the victim’s system. _“The Zscaler ThreatLabZ research team has been monitoring a new remote access Trojan_ _(RAT) family called Cobian RAT since February 2017. The RAT builder for this family was_ _first advertised on multiple underground forums where cybercriminals often buy and sell_ _[exploit and malware kits.” reads the analysis from Zscaler. “This RAT builder caught our](https://www.zscaler.com/blogs/research/cobian-rat-backdoored-rat)_ _attention as it was being offered for free and had lot of similarities to the njRAT/H-Worm_ _[family, which we analyzed in this report.”](https://www.zscaler.com/blogs/research/njrat-h-worm-variant-infections-continue-rise)_ Unfortunately, the Cobain RAT hides a malicious feature in an encrypted library, the code allows the author of the malware to take full control of machines infected with the RAT. ----- The code could be used by the author also to completely cut off the crooks who initially infected the machine with the Cobain RAT. The malware researchers noticed that the backdoor module hidden in the Cobian builder kit communicates with a preset page on Pastebin that was managed by the original author. In this way, the malware gets the current address of the command and control servers run by the original writer, but it first checks for the presence of the second level operator online to avoid being detected. The experts speculate the original author’s purpose is to build a massive botnet exploiting the effort of second operators in spreading the Cobian RAT. _“It is ironic to see that the second level operators, who are using this kit to spread malware_ _and steal from the end user, are getting duped themselves by the original author. The original_ _author is essentially using a crowdsourced model for building a mega Botnet that leverages_ _the second level operators Botnet.” concluded. “The original author is essentially using a_ _crowdsourced model for building a mega Botnet that leverages the second level operators’_ _Botnet.”_ **[Pierluigi Paganini](http://www.linkedin.com/pub/pierluigi-paganini/b/742/559)** **[(Security Affairs – Cobian RAT, malware)](http://securityaffairs.co/wordpress/)** Share On ----- You might also like **[The strange link between Industrial Spy and the Cuba ransomware operation](https://securityaffairs.co/wordpress/131754/cyber-crime/industrial-spy-cuba-ransomware.html)** May 28, 2022 By [Pierluigi Paganini](https://securityaffairs.co/wordpress/author/paganinip) **[GhostTouch: how to remotely control touchscreens with EMI](https://securityaffairs.co/wordpress/131714/hacking/ghosttouch-touchscreens-attack.html)** May 27, 2022 By [Pierluigi Paganini](https://securityaffairs.co/wordpress/author/paganinip) Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved. Back to top [Home](http://securityaffairs.co/wordpress/) [Cyber Crime](https://securityaffairs.co/wordpress/category/cyber-crime) [Cyber warfare](https://securityaffairs.co/wordpress/category/cyber-warfare-2) ----- [APT](https://securityaffairs.co/wordpress/category/apt) [Data Breach](https://securityaffairs.co/wordpress/category/data-breach) [Deep Web](https://securityaffairs.co/wordpress/category/deep-web) [Digital ID](https://securityaffairs.co/wordpress/category/digital-id) [Hacking](https://securityaffairs.co/wordpress/category/hacking) [Hacktivism](https://securityaffairs.co/wordpress/category/hacktivism) [Intelligence](https://securityaffairs.co/wordpress/category/intelligence) [Internet of Things](https://securityaffairs.co/wordpress/category/iot) [Laws and regulations](https://securityaffairs.co/wordpress/category/laws-and-regulations) [Malware](https://securityaffairs.co/wordpress/category/malware) [Mobile](https://securityaffairs.co/wordpress/category/mobile-2) [Reports](https://securityaffairs.co/wordpress/category/reports) [Security](https://securityaffairs.co/wordpress/category/security) [Social Networks](https://securityaffairs.co/wordpress/category/social-networks) [Terrorism](https://securityaffairs.co/wordpress/category/terrorism) [ICS-SCADA](https://securityaffairs.co/wordpress/category/ics-scada) [EXTENDED COOKIE POLICY](https://securityaffairs.co/wordpress/extended-cookie-policy) [Contact me](https://securityaffairs.co/wordpress/contact) -----