Analyzing an AI‑Developed C2 Remote‑Access Trojan Framework
The article details an AI‑crafted C2 remote‑access trojan framework hosted at 101.32.128[.]36:8443, describing its Go implant, Python listener, PowerShell stager, custom 443‑based encryption, Telegram bot exfiltration, the payload delivery chain via paste.rs and GitHub Gist, and provides sample hashes for the binaries.
Open directory address
101.32.128[.]36:8443Logs show repeated “prank” keywords, suggesting the framework is still in testing.
Component composition
Go implant
Python listener / CLI
PowerShell stager
Custom encrypted protocol over port 443
Data exfiltration via a Telegram bot
Payload delivery chain
Payloads are hosted on paste.rs and linked through a GitHub Gist. paste.rs/ei7cC contains
install.ps1 → stub.ps1 paste.rs/9NTrvAttack flow
Shortcut hijacking → VBS/PowerShell execution → UAC bypass → loader → HKCU startup entry → polling agent → RAT deployment.
Sample hashes
belgorod.exe
871ceb0b6b187e66caad5e55e787040460b5b9f865ae8765fa741a0c741ffbb7payload.bin (XOR‑obfuscated belgorod.exe)
efe7b09b00628d4ac649d6a378dafb146480abe49573af5eafa193f43181e0a0Black & White Path
We are the beacon of the cyber world, a stepping stone on the road to security.
How this landed with the community
Was this worth your time?
0 Comments
Thoughtful readers leave field notes, pushback, and hard-won operational detail here.
