Hackers Deploy Telegram-Based ResokerRAT With Screenshot and Persistence Features

By Published On: April 1, 2026

 

The Silent Threat: ResokerRAT Leverages Telegram for Covert Operations

The digital landscape is constantly shifting, and with it, the methods adversaries employ to compromise systems. A newly identified remote access trojan (RAT), dubbed ResokerRAT, highlights this evolution by eschewing traditional command-and-control (C2) infrastructure in favor of a widely trusted messaging platform: Telegram. This sophisticated malware presents a significant challenge for detection and defense by integrating directly with Telegram’s Bot API to manage infected Windows machines.

Unlike many conventional RATs that rely on dedicated C2 servers, ResokerRAT’s use of Telegram provides it with a stealthy, resilient, and difficult-to-block communication channel. This approach allows attackers to monitor victims, execute commands, and exfiltrate data without triggering common network-based security alerts associated with known malicious domains or IPs.

Understanding ResokerRAT’s Modus Operandi

ResokerRAT distinguishes itself through its innovative use of Telegram for C2 operations. This design decision offers several advantages to attackers, primarily stealth and resilience. By leveraging Telegram’s established and encrypted communication framework, the RAT can blend its malicious traffic with legitimate user activity, making it harder for security tools to differentiate between benign and malicious network packets.

Key features identified in ResokerRAT include:

  • Telegram Bot API Integration: The core of ResokerRAT’s communication strategy. It uses the Telegram Bot API to send system information, receive commands, and exfiltrate data remotely.
  • Screenshot Capabilities: The RAT can capture screenshots of the compromised system, providing attackers with visual insights into user activity and sensitive information displayed on the screen.
  • Persistence Mechanisms: ResokerRAT implements techniques to ensure its continued presence on an infected machine, even after reboots. This could involve modifying registry entries, creating scheduled tasks, or placing itself in startup folders.
  • Absence of Traditional C2: This is a critical departure from common RAT architectures. By removing the dependency on a dedicated server, the malware becomes more agile and significantly harder to shut down. Incident responders cannot simply block a domain or IP address to sever the C2 link.
  • Covert Monitoring: The ability to silently observe user actions without direct interaction, collecting sensitive data over time.

The Strategic Advantage of Telegram Integration

The choice to integrate with Telegram’s Bot API is a strategic one, offering significant benefits to the attackers behind ResokerRAT. Telegram is a legitimate and widely used application, often granted broad network permissions. This allows malicious traffic originating from ResokerRAT to often bypass firewalls and intrusion detection systems that might flag connections to unknown or suspicious IP addresses.

Furthermore, Telegram’s end-to-end encryption for secret chats and secure group communications, while beneficial for legitimate users, also provides a layer of obfuscation for malicious command-and-control traffic. Although the Bot API itself might not be end-to-end encrypted in the same way user-to-user chats are, the traffic still benefits from being contained within a trusted application’s communication channels, making deep packet inspection more challenging for defenders.

Remediation Actions and Defense Strategies

Defending against advanced threats like ResokerRAT requires a multi-layered security approach focusing on prevention, detection, and rapid response. Given its unconventional C2, standard blocking measures for malicious IPs are less effective.

  • Endpoint Detection and Response (EDR): Deploy and meticulously monitor EDR solutions capable of detecting anomalous process behavior, unauthorized system modifications, and suspicious network connections, even if they leverage legitimate applications.
  • Application Control and Whitelisting: Implement strict application control policies to prevent unauthorized executables from running. Whitelist approved applications and block all others to severely limit the attack surface for new or unknown malware.
  • Network Traffic Analysis (NTA): Utilize NTA tools to identify unusual communication patterns, even over legitimate channels like Telegram. Look for excessive data transfers, connections to unknown Telegram bot IDs, or unusual command structures. While direct content inspection might be difficult, behavioral analysis can still reveal anomalies.
  • User Training and Awareness: Educate users about phishing, social engineering, and the dangers of opening suspicious attachments or clicking malicious links. Initial infection often relies on tricking users into executing the malware.
  • Principle of Least Privilege: Enforce the principle of least privilege for all user accounts and applications. Restricting permissions can limit the damage an attacker can inflict if they gain a foothold.
  • Regular Software Updates and Patching: Ensure all operating systems, applications, and security software are regularly updated and patched. ResokerRAT, like many RATs, may exploit known vulnerabilities to gain initial access or escalate privileges.
  • Proactive Threat Hunting: Regularly hunt for indicators of compromise (IOCs) such as unusual registry modifications, persistence mechanisms (e.g., C:\Users\Public\Music\update.exe), or suspicious file creations that may not be caught by automated tools.

Conclusion

ResokerRAT represents a concerning evolution in remote access trojans, demonstrating attackers’ readiness to adapt and weaponize legitimate, widely-used platforms for their nefarious activities. Its Telegram-based C2 infrastructure poses unique challenges for traditional cybersecurity defenses, demanding a shift towards more sophisticated behavioral analysis, robust endpoint protection, and proactive threat hunting. Organizations must acknowledge this trend and bolster their defenses with strategies that account for malware capable of blending into legitimate network traffic, ensuring that the silent threat does not go undetected.

 

Share this article

Leave A Comment