CRAT wants to plunder your endpoints

The RAT consists of multiple obfuscation techniques to hide strings, API names, command and control (C2) URLs, and instrumental functions, along with static detection evasion.

CRAT wants to plunder your endpoints
The RAT consists of multiple obfuscation techniques to hide strings, API names, command and control (C2) URLs, and instrumental functions, along with static detection evasion.