Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Critical Palo Alto Firewall Vulnerability Exploited for Root Access
May 6, 2026
Optimize SOC Costs & Boost Confidence with Better Threat Intelligence
May 5, 2026
GnuTLS 3.8.13 Released with Fix for 12 Vulnerabilities Affecting
May 5, 2026
Home/Threats/Hackers Deploy ResokerRAT Using Telegram for Screenshots & Persistence
Threats

Hackers Deploy ResokerRAT Using Telegram for Screenshots & Persistence

ResokerRAT, a newly identified remote access trojan (RAT), leverages Telegram’s bot API as its primary communication channel. This allows it to covertly monitor and control compromised Windows...

Sarah simpson
Sarah simpson
March 31, 2026 4 Min Read
0 0

ResokerRAT, a newly identified remote access trojan (RAT), leverages Telegram’s bot API as its primary communication channel. This allows it to covertly monitor and control compromised Windows systems.

What makes this threat stand out is that it does not rely on a traditional command-and-control server.

Instead, it misuses a widely trusted messaging platform to receive attacker instructions and send stolen data back, making detection considerably more difficult for standard network security tools.

ResokerRAT is delivered as an executable file named Resoker.exe. Once a victim runs this file, the malware immediately starts working in the background, setting up persistence, requesting elevated privileges, and preparing to respond to remote commands.

Resoker.exe (Source - K7 Security Labs)
Resoker.exe (Source – K7 Security Labs)

Its capabilities range from capturing screenshots and downloading additional files to disabling Windows security prompts and blocking user access to diagnostic tools like Task Manager.

K7 Security Labs analysts identified the malware and noted that one of its first actions upon execution is creating a mutex called “GlobalResokerSystemMutex” using the Windows CreateMutexW API.

Mutex Creation (Source - K7 Security Labs)
Mutex Creation (Source – K7 Security Labs)

This mutex acts as a simple lock, ensuring only one instance of the malware runs on the system at a time. The malware also uses the IsDebuggerPresent function to check whether an analyst has attached a debugger to its process.

Anti-Analysis Debugger Check (Source - K7 Security Labs)
Anti-Analysis Debugger Check (Source – K7 Security Labs)

If a debugger is found, the malware triggers a custom exception to interrupt any ongoing analysis.

To gain deeper access, the malware attempts to relaunch itself with administrator privileges using the ShellExecuteExA function with the “runas” option.

Administrator Privilege Request (Source - K7 Security Labs)
Administrator Privilege Request (Source – K7 Security Labs)

If this elevation succeeds, the original instance shuts down and the elevated process takes over. Should it fail, the malware reports the error back through the Telegram bot.

It also scans running processes and forcibly terminates analysis tools like Taskmgr.exe, Procexp.exe, and ProcessHacker.exe using the TerminateProcess function.

Persistence and Remote Command Execution

The most alarming aspect of ResokerRAT is how it permanently embeds itself into a system while using Telegram as its live control channel.

When the attacker sends the /startup command, the malware writes its executable path to the Windows registry under HKCUSoftwareMicrosoftWindowsCurrentVersionRun with the key name “Resoker”.

Persistence Mechanism (Source - K7 Security Labs)
Persistence Mechanism (Source – K7 Security Labs)

This ensures the malware launches automatically every time the machine starts. A confirmation message reading “Added to startup” is then sent back to the attacker.

Startup Confirmation Message (Source - K7 Security Labs)
Startup Confirmation Message (Source – K7 Security Labs)

Communication between the malware and the attacker flows entirely through the Telegram Bot API. The malware constructs a URL using a hardcoded bot token and chat ID to continuously poll Telegram for new instructions. 

Before transmitting collected data, the malware encodes the content using URL encoding to help it pass through network filters without being flagged. This recurring traffic pattern was confirmed during network capture analysis.

Command-and-Control Traffic Observed in Wireshark (Source - K7 Security Labs)
Command-and-Control Traffic Observed in Wireshark (Source – K7 Security Labs)

Among the available remote commands, the /screenshot command is particularly invasive. When issued, the malware creates a Screenshots folder in its local directory and runs a hidden PowerShell script to capture the full screen, saving it as a PNG file, all without showing any window to the user.

The attacker can also weaken system defenses using the /uac-min command, which sets ConsentPromptBehaviorAdmin to 0 and disables the secure desktop prompt, while keeping UAC appearing enabled to avoid raising suspicion.

Users and security teams are strongly advised to monitor the Windows Run registry key for unauthorized entries and watch for outbound HTTPS traffic directed to api.telegram.org from unknown processes.

Keeping systems and software up to date, avoiding executable files from untrusted sources, and staying alert to any sudden inability to open Task Manager are essential steps toward reducing the risk of infection.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackHackerMalwareSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Anthropic’s Claude Source Code Leaked via npm Anthropic’s Reportedly

Next Post

Google Drive Gets Ransomware Detection & File Restoration

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Cisco Acquires Astrix Security to Boost Strengthen Agent
May 5, 2026
China-Aligned SHADOW-EARTH-053 Exploits Exchange Servers to Deploy
May 5, 2026
ScarCruft Supply Chain Attack Hits Gaming with Platform Windows
May 5, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us