Read more:A newly identified two-component Remote Access Trojan (RAT) toolkit built in Rust, dubbed SpankRAT, is being used by threat actors to abuse legitimate Windows processes, bypass reputation-based security controls, and maintain persistent access to compromised environments while largely evading detection on VirusTotal.
Researchers at ANY.RUN has identified and analyzed the SpankRAT toolkit, flagging it as a significant stealth threat due to its ability to route C2 traffic through trusted system processes.
Because malicious network activity originates from legitimate Windows binaries, the toolkit can evade reputation-based detection controls and be deprioritized during triage, drastically reducing SOC visibility and increasing the risk of missed compromise.
The SpankLoader: First Stage of Attack
SpankRAT Exploits Windows Explorer Processes for Stealth and Delayed Detection
SpankRAT is a Rust-based RAT toolkit that uses explorer.exe, DLL injection, WebSocket C2, and scheduled tasks for stealthy persistence while evading traditional detection.
cybersecuritynews.com