Inside Different Generations of RATs


Introduction

This page is the central hub for my series “Inside Different Generations of RATs”, documenting and analyzing the evolution of remote access tools (RATs) across different time periods.

The series aims to:

  • Understand how RAT architectures evolved
  • Analyze implementation details through reverse engineering
  • Identify design patterns, limitations, and security implications

This page will be continuously updated as new research is added.

Terminology

As mentioned in the articles, some RAT authors use the term “server” to refer to the payload, even though from a network architecture perspective it behaves as a client.

This is because the term “server” is sometimes used to describe the component that provides services to the operator, rather than its actual role in the network communication model.

A similar ambiguity can be observed in everyday terms such as “upload” and “download”, which depend on perspective.

To avoid confusion, this series uses the following terminology:

  • Controller: the attacker-side application
  • Payload: the executable deployed on the victim machine

This distinction is important when analyzing communication flows and understanding the underlying architecture of RATs.

Families

Articles

The table below lists all articles in this series analyzing various remote access tools.
It will be updated continuously as new research is published.

RAT Article
Why I started this series Inside Different Generations of RATs
Netbus Analyzing NetBus
Back Orifice Analyzing BackOrifice
Sub7 Analyzing Sub7
ProRat Analyzing ProRat
Beast Analyzing BeastDoor
Poison Ivy Analyzing Poison Ivy
DarkComet Analyzing DarkComet
Conclusion (1990s-2000s) Inside Different Generations of RATs (1990s-2000s)
Gh0st RAT Beta 2.5-3.6 Analyzing Gh0st RAT Beta 2.5-3.6
njRAT v0.7d Analyzing njRAT v0.7d
njRAT v0.9d Analyzing njRAT v0.9d
njRAT Lime/Green Edition Analyzing njRAT Lime and Green Edition
Gh0st RAT 1.0 Alpha Analyzing Gh0st RAT 1.0 Alpha
njRAT v0.10d Analyzing njRAT v0.10d
njRAT v0.8d Analyzing njRAT v0.8d
njRAT Golden Edition Analyzing njRAT Golden Edition
njRAT Korean Variants Analyzing Several Korean Variants of the njRAT Family
njRAT Danger Edition 2017 Analyzing njRAT Danger Edition 2017
njRAT Danger Edition 2018 Analyzing njRAT Danger Edition 2018
njRAT Danger Edition 2020 Analyzing njRAT Danger Edition 2020
njRAT Other Variants Analyzing Other Variants of the njRAT Family
Thought of Ransomware and RATs Ransomware vs. RAT

Roadmap

Planned analysis in this series includes:

  • Gh0st RAT Family
  • Quasar RAT
  • AsyncRAT
  • Remcos RAT
  • Agent Tesla

Future articles will focus on more modern RATs and their advanced techniques.

Supplement

Tutorials for Malware Analysis

Underlying Mechanism

THANKS FOR READING