Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

SeroXen: Stealthy RAT with Low Detection

June 1, 2023
Reading Time: 2 mins read
in Alerts

 

A stealthy remote access trojan (RAT) known as ‘SeroXen’ has gained popularity among cybercriminals due to its low detection rates and powerful capabilities. AT&T reports that the malware is being sold under the guise of a legitimate remote access tool for Windows 11 and 10, with prices ranging from $15/month to a “lifetime” license payment of $60.

While marketed as a legitimate program, SeroXen is being promoted as a RAT on hacking forums, although it remains uncertain whether these promoters are the developers or shady resellers. AT&T has observed a significant increase in SeroXen activity recently, with hundreds of samples detected since its creation in September 2022.

Primarily targeting the gaming community, SeroXen’s low cost makes it accessible to a wide range of threat actors. However, as its popularity continues to grow, there are concerns that its scope may expand to include larger organizations and companies.

SeroXen is built upon open-source projects such as Quasar RAT, the r77 rootkit, and NirCmd command line tool, offering a combination that makes the trojan more difficult to detect in static and dynamic analysis. Quasar RAT, the foundation of SeroXen, is a lightweight remote administration tool with various features, including reverse proxy, remote shell, remote desktop, TLS communication, and file management capabilities.

AT&T has observed SeroXen being distributed through phishing emails and Discord channels, where cybercriminals distribute ZIP archives containing heavily obfuscated batch files. The batch files extract encoded binaries and load them into memory using .NET reflection, while a modified version of msconfig.exe is temporarily stored in the “C:\Windows \System32” directory for malware execution.

This batch file then deploys a variant of the r77 rootkit named “InstallStager.exe.” The rootkit, stored in an obfuscated form in the Windows registry, is activated using PowerShell via the Task Scheduler, injecting it into “winlogon.exe.” By injecting the payload into memory, the r77 rootkit ensures that the SeroXen RAT remains undetected and enables remote access to the compromised device.

Once launched, the SeroXen RAT establishes communication with a command and control server, waiting for commands issued by the attackers.

AT&T warns that the increasing popularity of SeroXen could attract hackers interested in targeting larger organizations, emphasizing the need for network defenders to be vigilant. In response, AT&T has released indicators of compromise to assist in detecting and mitigating SeroXen attacks.

Reference:
  • SeroXen RAT for sale

Tags: AT&TCyber AlertCyber Alerts 2023CyberattackMay 2023RATSeroXenVulnerabilitiesWindows
ADVERTISEMENT

Related Posts

HTTPBot DDoS Threat To Windows Systems

Horabot Malware Targets LatAm Via Phishing

May 15, 2025
HTTPBot DDoS Threat To Windows Systems

Google Patches Chrome Account Takeover Bug

May 15, 2025
HTTPBot DDoS Threat To Windows Systems

HTTPBot DDoS Threat To Windows Systems

May 15, 2025
Microsoft Defender Bug Allows SYSTEM Access

Uncanny Automator Bug Risks WordPress Sites

May 14, 2025
Microsoft Defender Bug Allows SYSTEM Access

Devs Hit By PyPI Solana Token Secret Theft

May 14, 2025
Microsoft Defender Bug Allows SYSTEM Access

Microsoft Defender Bug Allows SYSTEM Access

May 14, 2025

Latest Alerts

Google Patches Chrome Account Takeover Bug

Horabot Malware Targets LatAm Via Phishing

HTTPBot DDoS Threat To Windows Systems

Microsoft Defender Bug Allows SYSTEM Access

Uncanny Automator Bug Risks WordPress Sites

Devs Hit By PyPI Solana Token Secret Theft

Subscribe to our newsletter

    Latest Incidents

    Dior Breach Exposes Asian Customer Data

    Australian Human Rights Body Files Leaked

    Nucor Cyberattack Halts Plants Networks

    Alabama Cybersecurity Event Hits Services

    Andy Frain Data Breach Impacts 100k People

    Hong Kong DSC Hit By Ransomware Attack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial