Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
TCLBANKER Malware Spreads Via WhatsApp Targets Users
May 9, 2026
NVIDIA Data Breach Exposes GeForce Users Reportedly Personal
May 9, 2026
Critical Microsoft 365 Copilot Flaws Ex Vulnerabilities Expose
May 9, 2026
Home/Threats/ResokerRAT Controls Infected Windows via Telegram Bot API
Threats

ResokerRAT Controls Infected Windows via Telegram Bot API

A newly identified Remote Access Trojan (RAT), dubbed ResokerRAT, targets Windows systems. It leverages Telegram’s widely adopted Bot API to establish command-and-control (C2) and exfiltrate...

Jennifer sherman
Jennifer sherman
April 6, 2026 4 Min Read
6 0

A newly identified Remote Access Trojan (RAT), dubbed ResokerRAT, targets Windows systems. It leverages Telegram’s widely adopted Bot API to establish command-and-control (C2) and exfiltrate stolen data back to its operators.

Unlike traditional malware that relies on custom command-and-control servers, this threat routes all communications through a trusted messaging platform, making it far harder for security tools to detect and block.

The approach gives attackers a well-disguised line of communication that blends into everyday web traffic.

ResokerRAT carries a wide range of harmful capabilities, including screen capture, keylogging, privilege escalation, Task Manager blocking, and downloading additional malicious payloads onto the infected machine.

Once installed, the malware operates silently in the background, communicating through an encrypted HTTPS connection to Telegram’s API without showing any visible signs to the victim.

Since the connections to Telegram are generally trusted by corporate firewalls and network monitoring filters, this method of delivering commands is particularly effective at staying hidden for extended periods.

Analysts at K7 Security Labs identified and documented this malware, with researcher Priyadharshini publishing a detailed technical report on March 30, 2026.

Their investigation found that the malware executable, Resoker.exe, begins its attack chain immediately upon execution, running a series of pre-checks and evasion routines before making contact with the attacker’s Telegram bot.

Resoker.exe (Source - K7 Security Labs)
Resoker.exe (Source – K7 Security Labs)

The team noted that the malware combines Windows API calls with hidden PowerShell commands to carry out its tasks without drawing the user’s attention.

Once running, Resoker.exe creates a mutex named “GlobalResokerSystemMutex” to ensure only one instance of the malware runs at a time.

Mutex Creation (Source - K7 Security Labs)
Mutex Creation (Source – K7 Security Labs)

It then uses the IsDebuggerPresent API to check whether a debugger or analysis tool is currently attached, and if one is found, it triggers custom exception handling to disrupt the inspection.

Anti-Analysis Debugger Check (Source - K7 Security Labs)
Anti-Analysis Debugger Check (Source – K7 Security Labs)

The malware also attempts to restart itself with administrator rights using ShellExecuteExA with the “runas” option (Figure 4: Administrator Privilege Request), giving it complete control over the infected system.

To keep security researchers at bay, the malware actively scans running processes and terminates well-known analysis tools such as Taskmgr.exe, Procexp.exe, and ProcessHacker.exe.

Keyboard Hook Using SetWindowsHookExW (Source - K7 Security Labs)
Keyboard Hook Using SetWindowsHookExW (Source – K7 Security Labs)

It also installs a global keyboard hook via SetWindowsHookExW, blocking common keyboard shortcuts such as ALT+TAB and CTRL+ALT+DEL, effectively trapping the user inside the infected session and preventing normal system interaction.

Command-and-Control via Telegram

The most distinctive element of ResokerRAT is its use of the Telegram Bot API as a full command-and-control channel.

The malware constructs a URL with a hardcoded bot token and chat ID, then polls Telegram’s getUpdates endpoint for new instructions.

Telegram Bot API URL Used for C2 Communication (Source - K7 Security Labs)
Telegram Bot API URL Used for C2 Communication (Source – K7 Security Labs)

This traffic is nearly indistinguishable from regular Telegram use, as confirmed by network capture analysis.

Command-and-Control Traffic Observed in Wireshark (Source - K7 Security Labs)
Command-and-Control Traffic Observed in Wireshark (Source – K7 Security Labs)

From this channel, attackers can issue a range of commands. The /screenshot command runs a hidden PowerShell script to silently capture the screen and save it as a PNG file. The /startup command drops the malware’s path into the Windows Run registry key, ensuring it survives reboots.

The /download command fetches additional files from attacker-controlled URLs via a hidden PowerShell process.

The /uac-min command quietly weakens User Account Control by setting ConsentPromptBehaviorAdmin to 0, removing security prompts without the user’s knowledge.

All transmitted data is URL-encoded before delivery, and the malware keeps a local log of its own activity.

Users and organizations should avoid downloading executables from untrusted links or unknown sources. Keeping Windows and all security software up to date is critical, as patches help close the gaps that malware exploits.

Network administrators should monitor outbound connections to Telegram API endpoints for unusual or unexpected patterns.

Restricting PowerShell execution policies and enabling endpoint detection tools can help identify and stop this type of threat before it causes serious damage.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitHackerMalwarePatchSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

METATRON: Open-Source AI Pen Testing Assistant Penetration Brings

Next Post

Critical Claude Code Flaw Bypasses Security Rules Sil

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
PamDOORa Backdoor Attacks Linux, Attacking Systems
May 8, 2026
Škoda Online Shop Security Incident Exposes Customers Data
May 8, 2026
Hackers Steal Crypto & Passwords via Fake OpenClaw Installer
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us