GokbakarE's Blog

Technical Review of "ABC Overlay" Based RAT Variants

Published on July 24, 2025

The purpose of this article is to explain, within a technical framework, the GUI structure and overlay addressing technique commonly used in some RAT (Remote Access Trojan) creation software that caught my attention during my personal research.

Introduction

Some RAT creation tools are configured using similar techniques, almost as exact copies of each other. The common point that stands out in these types of RATs is that the configuration data is located in the overlay section of the PE file unencrypted or only hidden using a very simple method.

I have named the RATs falling into this category as "ABC RATs" due to their similar data formats and structures.

Technical Features

The overlay section in these RATs typically contains the following data:

Technical Observation: All analyzed builders write data to the overlay area of the PE file in a plaintext and fixed pattern. This structure can be easily seen directly with tools like hexdump.

Common fixed pattern:

61 62 63 63 62 61 32 31 65 64 73 61 64 78 64 61 62 63 63 62 61 33 31 32 34 61 62 63 63 62 61 63

This data is typically structured as abccba<data>abccba and is embedded at the end of the file (overlay). This segment does not have a defined offset in the PE header, meaning the end of the file is determined directly through analysis.

Import Feature: In all listed RAT samples, only mscoree.dll is imported, and specifically the _CorExeMain function is called. This indicates that a .NET-based payload is embedded.

Overlay Hex Format:

abccba127.0.0.1abccba55abccbaMr.Errorabccba0abccbaName.exeabccba0abccbaname.exe...

YARA Rule

The following YARA rule is specifically prepared to detect ABC RAT variants:

rule ABC_RATs
{
    meta:
        description = "ABC RAT's Detector Rule "
        author = "GokbakarE"
        date = "24-07-2025"
        license = "MIT License"
    strings:
        $Overlay = { 61 62 63 63 62 61 }
    condition:
        pe.is_pe and
        pe.imports("mscoree.dll") and
        pe.imports("mscoree.dll", "_CorExeMain") and
        $Overlay in (pe.overlay.offset .. pe.overlay.offset + pe.overlay.size)    
}
    

Explanation: The rule focuses on both the mscoree.dll import and the fixed signature in the overlay region. It provides a high hit rate. It can be easily integrated into a signature-based scanning system relying on overlay analysis.

These configurations are placed at the end of the file (overlay area) with a specific pattern. The most commonly used pattern is as follows:

abccba<data>abccba

An example of this structure is given below:

Binary:

61 62 63 63 62 61 31 32 37 2E 30 2E 30 2E 31 61 62 63 63 62 61 35 35 ...

String equivalent:

abccba127.0.0.1abccba55abccbaMr.Errorabccba0abccbaName.exeabccba0abccbaname.exe...

In this example:

Common Graphical User Interface (GUI) Features

The interfaces of the builder software that create these RATs are also quite similar to each other:

ABC RAT Builder GUI Example

Typical GUI structure of ABC RAT Builders (Example 1)

ABC RAT Builder GUI Example 2

Typical GUI structure of ABC RAT Builders (Example 2)

These builders generally include:

Detected "ABC RAT" Based Builders

Analysis has determined that the following builder software use the same overlay format and structure:

The builder software listed above, although bearing formally different names, largely use the same infrastructure and produce similar overlay formats. This situation suggests that these tools are either produced by the same developer or that the same source code is repackaged by different individuals.

Example: VanToM RAT Overlay Analysis

Below is the structure detected in the overlay section of a RAT file created with the VanToM_RAT_1_0 software, given directly:

abccba127.0.0.1abccba55abccbaMr.Errorabccba0abccbaName.exeabccba0abccbaname.exeabccba0abccba0abccba0abccba0abccba0abccba0abccba0abccba0abccba0abccba0

This structure contains the following:

Importance for Security and Detection

These types of RAT configurations prefer to place data in the overlay section of the PE file rather than standard sections, especially to evade antivirus detection. However, this method:

Conclusion

This malware family, defined as "ABC RATs", creates a wide variation using the same structure, format, and builder logic, albeit with low-level obfuscation techniques. This situation provides an advantage for security researchers to detect similar RATs and automate analysis processes.

Recommendations:

Author:
GokbakarE
Date: July 24, 2025

← Back to Home