Hello, I stumbled on a website, claiming to give you access to a RAT. I downloaded one of them and I began to analyze what this actually is.

(Educational Purposes Only)

image.png

Some of the “RATs” (Remote Access Trojan) had interesting names to say the least. But the thing is, these “RATs” are actually malware, and we will be analyzing Aphrobyte RAT 2026. But first I want to show you more of the website.

Every time you click their Instagram links, Youtube, etc. It just redirects back to the website. And there is way more than just “RATs”

image.png

image.png

There is 81 pages of this website.

—-

Now it’s time to actually analyze what one of these RATs are doing.

Screenshot 2026-03-22 110824.png

Here is our sample.

Screenshot 2026-03-22 111201.png

Just from this, we can say that this is a Discord based Remote Access Trojan (RAT)

Command & Control (C2): It uses Discord as its infrastructure. It requires a Bot Token and Guild ID.

Capabilities: The checkboxes show typical RAT features: persistence (Add to startup), evasion (Anti VM / Sandbox), and stealth (Hide after execution)

It uses GetTickCount for debugger detection (timing checks)

It modifies shortcuts in the Startup folder

It contains various hashing and encryption algorithms (AES, XOR, SHA256)

Next, I will use 7zip on the .exe to see what is inside.

Screenshot 2026-03-22 123126.png

We see svchost.exe

Real Windows svchost.exe files live in C:\\Windows\\System32. Seeing one here is a guarantee of a Masquerading attempt.

Screenshot 2026-03-22 123341.png

I opened sample.py in sublime text.

Screenshot 2026-03-22 124005.png

Taking a look here.

It uses discord to establish the Command and Control channel and `requests

os, sys, and psutil` give it deep access to the Windows operating system, allowing it to modify the registry, manage processes, and execute shell commands.

sqlite3, base64, and cryptography are specifically imported to decrypt and steal browser cookies and saved passwords

Now it’s time for dynamic analysis

I ran all of the EXEs are here is what I got:

Screenshot 2026-03-22 131043.png

When I ran the aphrobyte-discord-rat.exe a GUI came up. Now this is actually a real, functional Remote Access Trojan (RAT). The GUI is there for the Attacker, not the victim.