cognitive cybersecurity intelligence

News and Analysis

Search

New ResokerRAT Uses Telegram Bot API to Control Infected Windows Systems

New ResokerRAT Uses Telegram Bot API to Control Infected Windows Systems

A new Remote Access Trojan (RAT) called ResokerRAT has been found targeting Windows systems by abusing Telegram’s widely used Bot API to receive commands and send stolen data back to attackers.

Unlike traditional malware that relies on custom command-and-control servers, this threat routes all communications through a trusted messaging platform, making it far harder for security tools to detect and block.

The approach gives attackers a well-disguised line of communication that blends into everyday web traffic.

ResokerRAT carries a wide range of harmful capabilities, including screen capture, keylogging, privilege escalation, Task Manager blocking, and downloading additional malicious payloads onto the infected machine.

Once installed, the malware operates silently in the background, communicating through an encrypted HTTPS connection to Telegram’s API without showing any visible signs to the victim.

Since the connections to Telegram are generally trusted by corporate firewalls and network monitoring filters, this method of delivering commands is particularly effective at staying hidden for extended periods.

Analysts at K7 Security Labs identified and documented this malware, with researcher Priyadharshini publishing a detailed technical report on March 30, 2026.

Their investigation found that the malware executable, Resoker.exe, begins its attack chain immediately upon execution, running a series of pre-checks and evasion routines before making contact with the attacker’s Telegram bot.

Resoker.exe (Source – K7 Security Labs)

The team noted that the malware combines Windows API calls with hidden PowerShell commands to carry out its tasks without drawing the user’s attention.

Once running, Resoker.exe creates a mutex named “Global\ResokerSystemMutex” to ensure only one instance of the malware runs at a time.

Mutex Creation (Source – K7 Security Labs)

It then uses the IsDebuggerPresent API to check whether a debugger or analysis tool is currently attached, and if one is found, it triggers custom exception handling to disrupt the inspection.

Anti-Analysis Debugger Check (Source – K7 Security Labs)

The malware also attempts to restart itself with administrator rights using ShellExecuteExA with the “runas” option (Figure 4: Administrator Privilege Request), giving it complete control over the infected system.

To keep security researchers at bay, the malware actively scans running processes and terminates well-known analysis tools such as Taskmgr.exe, Procexp.exe, and ProcessHacker.exe.

Keyboard Hook Using SetWindowsHookExW (Source – K7 Security Labs)

It also installs a global keyboard hook via SetWindowsHookExW, blocking common keyboard shortcuts such as ALT+TAB and CTRL+ALT+DEL, effectively trapping the user inside the infected session and preventing normal system interaction.

Command-and-Control via Telegram

The most distinctive element of ResokerRAT is its use of the Telegram Bot API as a full command-and-control channel.

The malware constructs a URL with a hardcoded bot token and chat ID, then polls Telegram’s getUpdates endpoint for new instructions.

Telegram Bot API URL Used for C2 Communication (Source – K7 Security Labs)

This traffic is nearly indistinguishable from regular Telegram use, as confirmed by network capture analysis.

Command-and-Control Traffic Observed in Wireshark (Source – K7 Security Labs)

From this channel, attackers can issue a range of commands. The /screenshot command runs a hidden PowerShell script to silently capture the screen and save it as a PNG file. The /startup command drops the malware’s path into the Windows Run registry key, ensuring it survives reboots.

The /download command fetches additional files from attacker-controlled URLs via a hidden PowerShell process.

The /uac-min command quietly weakens User Account Control by setting ConsentPromptBehaviorAdmin to 0, removing security prompts without the user’s knowledge.

All transmitted data is URL-encoded before delivery, and the malware keeps a local log of its own activity.

Users and organizations should avoid downloading executables from untrusted links or unknown sources. Keeping Windows and all security software up to date is critical, as patches help close the gaps that malware exploits.

Network administrators should monitor outbound connections to Telegram API endpoints for unusual or unexpected patterns.

Restricting PowerShell execution policies and enabling endpoint detection tools can help identify and stop this type of threat before it causes serious damage.

Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google.
The post New ResokerRAT Uses Telegram Bot API to Control Infected Windows Systems appeared first on Cyber Security News.

Source: cybersecuritynews.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts