Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

SeroXen: Stealthy RAT with Low Detection

June 1, 2023
Reading Time: 2 mins read
in Alerts

 

A stealthy remote access trojan (RAT) known as ‘SeroXen’ has gained popularity among cybercriminals due to its low detection rates and powerful capabilities. AT&T reports that the malware is being sold under the guise of a legitimate remote access tool for Windows 11 and 10, with prices ranging from $15/month to a “lifetime” license payment of $60.

While marketed as a legitimate program, SeroXen is being promoted as a RAT on hacking forums, although it remains uncertain whether these promoters are the developers or shady resellers. AT&T has observed a significant increase in SeroXen activity recently, with hundreds of samples detected since its creation in September 2022.

Primarily targeting the gaming community, SeroXen’s low cost makes it accessible to a wide range of threat actors. However, as its popularity continues to grow, there are concerns that its scope may expand to include larger organizations and companies.

SeroXen is built upon open-source projects such as Quasar RAT, the r77 rootkit, and NirCmd command line tool, offering a combination that makes the trojan more difficult to detect in static and dynamic analysis. Quasar RAT, the foundation of SeroXen, is a lightweight remote administration tool with various features, including reverse proxy, remote shell, remote desktop, TLS communication, and file management capabilities.

AT&T has observed SeroXen being distributed through phishing emails and Discord channels, where cybercriminals distribute ZIP archives containing heavily obfuscated batch files. The batch files extract encoded binaries and load them into memory using .NET reflection, while a modified version of msconfig.exe is temporarily stored in the “C:\Windows \System32” directory for malware execution.

This batch file then deploys a variant of the r77 rootkit named “InstallStager.exe.” The rootkit, stored in an obfuscated form in the Windows registry, is activated using PowerShell via the Task Scheduler, injecting it into “winlogon.exe.” By injecting the payload into memory, the r77 rootkit ensures that the SeroXen RAT remains undetected and enables remote access to the compromised device.

Once launched, the SeroXen RAT establishes communication with a command and control server, waiting for commands issued by the attackers.

AT&T warns that the increasing popularity of SeroXen could attract hackers interested in targeting larger organizations, emphasizing the need for network defenders to be vigilant. In response, AT&T has released indicators of compromise to assist in detecting and mitigating SeroXen attacks.

Reference:
  • SeroXen RAT for sale

Tags: AT&TCyber AlertCyber Alerts 2023CyberattackMay 2023RATSeroXenVulnerabilitiesWindows
ADVERTISEMENT

Related Posts

Yes24 Down After Cyberattack

Win-DDoS Flaws Enable DC DDoS Botnets

August 12, 2025
Yes24 Down After Cyberattack

GPT-5 Jailbreak, Zero-Click AI Threats

August 12, 2025
Yes24 Down After Cyberattack

7-Zip Flaw Enables Arbitrary Code Run

August 12, 2025
WinRAR Zero-Day Actively Exploited

WinRAR Zero-Day Actively Exploited

August 11, 2025
WinRAR Zero-Day Actively Exploited

Lenovo Linux Webcam BadUSB Flaw

August 11, 2025
WinRAR Zero-Day Actively Exploited

Tesla-Themed Malware in Google Ads

August 11, 2025

Latest Alerts

Win-DDoS Flaws Enable DC DDoS Botnets

GPT-5 Jailbreak, Zero-Click AI Threats

7-Zip Flaw Enables Arbitrary Code Run

Tesla-Themed Malware in Google Ads

Lenovo Linux Webcam BadUSB Flaw

WinRAR Zero-Day Actively Exploited

Subscribe to our newsletter

    Latest Incidents

    Columbia Data Breach Hits 900K

    Chinese Gang Hits 115M US Payment Cards

    Yes24 Down After Cyberattack

    University of WA Major Data Breach

    Google Ads Customers’ Data Breach

    Connex Credit Union Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial