SURXRAT: From ArsinkRAT roots to LLM Module Downloads Signaling Functionality Enlargement
Cyble uncovers SURXRAT’s evolution throughout variations, constructed on ArsinkRAT code, and now downloading giant LLM modules signaling an enlargement of its operational capabilities.
Government Abstract
SURXRAT is an actively developed Android Distant Entry Trojan (RAT) commercially distributed by way of a Telegram-based malware-as-a-service (MaaS) ecosystem beneath the SURXRAT V5 branding.
The malware is marketed utilizing structured reseller and accomplice licensing tiers, permitting associates to generate and distribute custom-made builds whereas the operator maintains centralized infrastructure and operational management.
This distribution mannequin displays the rising professionalization of the Android risk panorama, the place malware builders concentrate on scalability and monetization by way of affiliate-driven campaigns.
Technical evaluation reveals that SURXRAT operates as a full-featured surveillance and device-control platform able to in depth knowledge exfiltration, real-time distant command execution, and ransomware-style machine locking.
The malware abuses accessibility permissions for persistent management and communicates with a Firebase-based command-and-control infrastructure to handle contaminated units. Code similarities counsel that it advanced from the ArsinkRAT household.
We’ve recognized the newest samples that conditionally obtain a big LLM module, indicating experimentation with AI-assisted capabilities, machine efficiency manipulation, and different monetization methods alongside conventional surveillance and extortion actions.
Whereas it could not all the time be potential to keep away from these threats totally, immediate motion will help scale back the impression of compromise. Risk intelligence instruments comparable to Imaginative and prescient present customers with a real-time view of their digital risk panorama, alerting them to any compromise and enabling them to take corrective motion.
Key Takeaways
- SURXRAT is bought brazenly by way of Telegram, with reseller and accomplice licensing tiers, enabling scalable distribution by way of affiliate operators somewhat than centralized campaigns.
- Supply code references and purposeful overlap point out SURXRAT possible advanced from ArsinkRAT, highlighting continued reuse and speedy enhancement of Android RAT frameworks.
- The malware collects delicate knowledge, together with SMS messages, contacts, name logs, machine data, location knowledge, and browser exercise, enabling credential theft and monetary fraud operations.
- Use of Firebase Realtime Database infrastructure permits attackers to mix malicious communications with legit cloud visitors, enhancing reliability and complicating detection.
- SURXRAT conditionally downloads a big LLM module from exterior repositories, suggesting experimentation with AI-driven performance, machine efficiency manipulation, or evasion methods.
- The built-in ransomware-style display screen locker allows attackers to disclaim machine entry and demand cost, permitting versatile monetization by way of surveillance, fraud, or extortion.
Overview
Cyble Analysis and Intelligence Labs (CRIL) recognized a brand new variant of SURXRAT, an actively developed Android Distant Entry Trojan (RAT) being brazenly commercialized by way of a devoted Telegram-based distribution ecosystem. Not like opportunistic commodity malware, SURXRAT is positioned as a subscription-style cybercrime product, indicating an rising stage of professionalization within the Android malware-as-a-service (MaaS) panorama.
The Indonesian risk actor (TA) operates a Telegram channel by way of which the malware is marketed, frequently up to date, and distributed to resellers and companions. The channel was created in late 2024, suggesting that lively malware improvement possible started in early 2025. On the time of study, we recognized greater than 180 associated samples, indicating steady improvement exercise and demonstrating that the risk actor is actively sustaining and evolving the malware.

The structured pricing tiers, operational bulletins, and have updates display a mature commercialization mannequin much like underground SaaS platforms, suggesting the operator is focusing on aspiring cybercriminals somewhat than conducting assaults immediately.
SURXRAT is marketed beneath a structured licensing scheme branded as SURXRAT V5, indicating lively improvement and ongoing model iteration by the operator. The risk actor presents two main buy tiers inside a “Prepared Plan” mannequin designed to draw each particular person operators and bigger resellers.

The Reseller Plan, marketed at a one-time cost of 200k, supplies everlasting entry, permits consumers to generate as much as three malware builds per day, contains free server upgrades, and permits customers to create and promote SURXRAT builds whereas adhering to the operator’s predefined market pricing.
The Associate Plan, priced at 500k as a everlasting license, expands these capabilities by rising the every day construct restrict to 10 accounts, sustaining free server upgrades, and granting consumers the flexibility to determine their very own reseller networks, successfully enabling additional distribution.
Each tiers emphasize a one-time cost construction (“anti pt pt”), suggesting no recurring subscription charges. This tiered commercialization method demonstrates the operator’s deliberate try and scale malware adoption by way of affiliate-style distribution, decentralizing an infection operations whereas retaining centralized management over infrastructure and ecosystem governance.
The risk actor periodically posts operational statistics to bolster legitimacy and entice consumers. One such announcement revealed:
- Bot Standing: Energetic
- Complete Customers: 1,318 registered accounts inside the system
- Operational affirmation timestamp: January 2026

Whereas these figures can’t be independently verified, public disclosure of consumer metrics is a standard underground advertising and marketing tactic supposed to determine credibility and display adoption amongst cybercriminal clients. If correct, the numbers counsel a rising ecosystem of operators leveraging SURXRAT for Android surveillance and monetary fraud operations.
SURXRAT V5 supplies a complete surveillance and remote-control function set in line with fashionable Android RATs. The performance signifies a powerful emphasis on knowledge harvesting, machine monitoring, and full distant manipulation.
Knowledge Assortment and Surveillance Options
The malware allows in depth extraction of delicate consumer data, together with:
- SMS monitoring
- Contact record and name logs
- System data and put in purposes
- Gmail account knowledge
- Gadget location monitoring
- Community and connectivity data
- Notification interception
- Clipboard monitoring
- Internet searching historical past
- Mobile tower intelligence
- WiFi scanning and connection historical past
- Full file supervisor entry
This stage of visibility permits attackers to carry out credential harvesting, OTP interception, profiling, and reconnaissance for secondary fraud operations.
Distant Gadget Management Capabilities
SURXRAT extends past passive surveillance by enabling attackers to control compromised units actively:
- Distant machine unlocking
- Triggering cellphone calls
- Wallpaper modification by way of distant URL
- Distant audio playback
- Community lag manipulation
- Push notification supply
- Compelled web site opening
- Flashlight activation
- Gadget vibration management
- On-screen textual content overlays
- Gadget locking utilizing attacker-defined PIN
- Full storage wipe performance
Throughout evaluation of the SURXRAT pattern, references to ArsinkRAT have been discovered within the supply code, suggesting a developmental relationship between the 2 malware households. In January 2026, Zimperium reported a rise in exercise related to ArsinkRAT campaigns focusing on Android units.
A comparative evaluation signifies notable purposeful and structural similarities between SURXRAT and ArsinkRAT, suggesting that the risk actor possible leveraged the ArsinkRAT supply code. Utilizing this basis, an enhanced variant incorporating further capabilities and up to date options was subsequently developed.

This evolution highlights how present Android RAT frameworks proceed to be repurposed and expanded by risk actors, accelerating malware improvement cycles and enabling speedy introduction of latest surveillance and management functionalities.
Throughout our evaluation of the newest SURXRAT variant, we recognized a deliberate mechanism to control community lag. The malware initiates the obtain of a big LLM module (>23GB) hosted on Hugging Face. This method is very atypical for a mobile-based machine.
Notably, this obtain is conditionally triggered when particular gaming purposes are lively on the sufferer’s machine, particularly Free Hearth MAX x JUJUTSU KAISEN (com.dts.freefiremax) and Free Hearth x JUJUTSU KAISEN (com.dts.freefireth), or when the malware receives different goal bundle names dynamically from the risk actor–managed server.
This means that the obtain habits is remotely configurable, permitting operators to provoke the module retrieval based mostly on purposes specified by way of backend instructions.

Whereas downloading a mannequin of this measurement on a cellular machine might initially seem impractical, the noticed habits signifies intentional implementation somewhat than a misconfiguration. The LLM module seems to be beneath lively improvement and could also be leveraged to:
- Intentionally introduce machine or community latency throughout gameplay, probably supporting paid dishonest or disruption providers
masks malicious background exercise by degrading total machine efficiency, main customers to attribute irregular habits to system points somewhat than malware
allow future AI-driven capabilities, comparable to automated interactions or adaptive social engineering methods
The selective and conditional deployment of this module means that the risk actor is actively experimenting with AI-based elements to boost monetization methods, enhance evasion methods, and develop operational capabilities.
Technical Evaluation
Upon execution, the malware prompts the sufferer to grant a number of high-risk permissions, together with entry to location providers, contacts, SMS messages, and machine storage.
Following preliminary permission approval, the malware shows further prompts guiding the consumer to allow Accessibility Companies. This generally abused Android function permits purposes to watch display screen content material and carry out automated actions. The abuse of accessibility permissions considerably will increase attacker management, enabling surveillance and facilitating additional malicious operations with out steady consumer interplay.

After buying the required permissions, SURXRAT establishes communication with a backend infrastructure hosted on a Firebase Realtime Database:
hxxps://xrat-sisuriya-default-rtdb.firebaseio[.]com
The malware connects utilizing a database reference labeled “arsinkRAT,” additional reinforcing the developmental linkage between SURXRAT and the beforehand noticed ArsinkRAT malware household.
As soon as connectivity is established, the malware performs machine registration by producing a random UUID, which serves as a novel identifier for monitoring contaminated units. Following registration, SURXRAT instantly begins exfiltrating delicate data to the Firebase backend.

The malware collects and transmits a variety of sufferer knowledge, enabling complete machine profiling. Exfiltrated data contains:
- Contact lists
- SMS messages
- Name logs
- Gadget model and mannequin
- Android OS model
- Battery stage and standing
- SIM card particulars
- Community data
- Public IP deal with
This dataset permits attackers to uniquely establish victims, monitor communications, and put together follow-on fraud or surveillance actions comparable to OTP interception and account takeover.
After profitable machine registration, SURXRAT launches a persistent background service that maintains steady communication with the Firebase command-and-control (C&C) infrastructure and receives instructions. The malware initializes a number of inside supervisor courses that deal with surveillance, machine management, and knowledge assortment.

The contaminated machine periodically sends standing updates to the backend whereas concurrently polling for incoming instructions issued by the operator. This close to real-time synchronization allows attackers to execute actions on compromised units remotely with minimal delay.
Evaluation of command handlers revealed a number of directions obtained from the Firebase backend that permit attackers to carry out surveillance and lively machine manipulation:
| Spy Commands | Description |
| accounts | Collects Google account data related to the machine |
| apps_list | Retrieves the record of put in purposes |
| device_info | Collects detailed machine metadata |
| audio_record | Information audio |
| file_list | Enumerates information and extracts metadata |
| flashlight | Remotely controls the machine flashlight |
| camera_photo | Captures pictures utilizing the machine digital camera |
| contacts | Collects contacts |
| call_log | Collects name log |
| sms_read | Collects SMSs |
| Sms_send | Sends SMSs from the contaminated machine |
| tts | Execute textual content to speech |
| name | Makes a name from the contaminated machine |
| toast | Show a toast message |
| vibrate | Remotely vibrates the machine |
| file_delete | Deletes file |
| location | Collects the sufferer’s location |
| file_upload | Sends file to the server |
| RAT Instructions | Description |
| entry | Collects clipboard knowledge |
| unlock | Take away locks |
| app | Sync app record |
| Cal | Dail calls |
| fla | Handles flashlight |
| for | Wipe knowledge |
| Mus | Play music |
| Not | Ship System replace notification |
| url | Opens URL |
| vib | Vibrates machine |
| voi | Executes text-to-speech |
| wal | Adjustments wallpapers |
| Forehead | Collects browser historical past |
| Cell | Collects the machine’s cell information |
| Lock | Execute the Display screen Locker function |
| wifih | Acquire Wi-Fi historical past |
| wifis | Execute text-to-speech |
The determine under reveals the admin panel picture shared on the risk actor’s Telegram account, highlighting the assorted actions and controls accessible by way of SURXRAT.

Display screen Locker Exercise
The SURXRAT pattern additionally comprises a ransomware-style display screen locker module that enables a distant attacker to grab management of the sufferer’s machine and briefly deny entry to it. When activated, the malware forces the machine to show a persistent full-screen lock message that the consumer can not simply dismiss. The attacker can remotely customise each the displayed message and the unlock PIN, enabling them to demand a ransom cost immediately from the sufferer.

The malware repeatedly stories consumer interactions again to the attacker’s server. Every incorrect PIN entry is transmitted to the backend, permitting the operator to watch sufferer habits and response makes an attempt in actual time. The lock display screen will also be remotely eliminated by the attacker, giving them full management over when the machine turns into usable once more. General, this performance seems supposed to coerce victims by way of disruption and intimidation, in the end facilitating ransom-based monetization.

The combination of ransomware-style locking right into a surveillance RAT signifies hybrid monetization, permitting operators to change between espionage, fraud, and direct extortion based mostly on the worth of the sufferer.
Conclusion
SURXRAT represents a notable evolution in Android malware, combining MaaS-style commercialization, cloud-based command infrastructure, and modular capabilities right into a single adaptable risk platform. The malware’s in depth surveillance options, real-time distant management capabilities, and ransomware-style machine locking display a shift towards multi-functional cellular threats designed for versatile monetization.
The noticed experimentation with giant AI mannequin integration additional signifies that risk actors are actively exploring rising applied sciences to boost operational effectiveness and evade detection. As Android malware ecosystems proceed to mature, threats like SURXRAT spotlight the rising accessibility of superior cellular assault capabilities to a broader cybercriminal viewers, reinforcing the necessity for improved cellular risk visibility, behavioral detection, and consumer consciousness.
Prevention is good, nevertheless it isn’t all the time an possibility. Risk Intelligence platforms comparable to Cyble Imaginative and prescient present customers with perception into their digital danger profile and might notify them of any breaches or unauthorized entry, enabling them to take speedy corrective motion.
Our Suggestions
We’ve listed some important cybersecurity finest practices that function the primary line of protection towards attackers. We advocate that our readers comply with the most effective practices given under:
- Set up Apps Solely from Trusted Sources:
Obtain apps completely from official platforms, such because the Google Play Retailer. Keep away from third-party app shops or hyperlinks obtained by way of SMS, social media, or e-mail. - Be Cautious with Permissions and Installs:
By no means grant permissions and set up an utility except you’re sure of an app’s legitimacy. - Look ahead to Phishing Pages:
All the time confirm the URL and keep away from suspicious hyperlinks and web sites that ask for delicate data. - Allow Multi-Issue Authentication (MFA):
Use MFA for banking and monetary apps so as to add an additional layer of safety, even when credentials are compromised. - Report Suspicious Exercise:
Should you suspect you’ve been focused or contaminated, report the incident to your financial institution and native authorities instantly. If vital, reset your credentials and carry out a manufacturing unit reset. - Use Cellular Safety Options:
Set up a cellular safety utility that features real-time scanning. - Preserve Your Gadget Up to date:
Guarantee your Android OS and apps are up to date frequently. Safety patches typically deal with vulnerabilities exploited by malware.
MITRE ATT&CK® Methods
| Tactic | Approach ID | Process |
| Persistence (TA0028) | Occasion Triggered Execution: Broadcast Receivers(T1624.001) | SURXRAT registered the BOOT_COMPLETED broadcast receiver to activate the display screen locker exercise |
| Persistence (TA0028) | Foreground Persistence (T1541) | SURXRAT makes use of foreground providers by exhibiting a notification |
| Protection Evasion (TA0030) | Impair Defenses: Forestall Software Removing (T1629.001) | Forestall uninstallation |
| Protection Evasion (TA0030) | Obfuscated Information or Data (T1406) | SURXRAT makes use of a Base64 encoding to encode the stolen information and ship them to the Telegram Bot |
| Credential Entry (TA0031) | Entry Notifications (T1517) | SURXRAT collects machine notifications |
| Discovery (TA0032) | Software program Discovery (T1418) | SURXRAT collects the put in utility record |
| Discovery (TA0032) | System Data Discovery (T1426) | SURXRAT collects the machine data |
| Discovery (TA0032) | System Community Connections Discovery (T1421) | SURXRAT collects cell and wifi data |
| Discovery (TA0032) | File and Listing Discovery (T1420) | SURXRAT Enumerates exterior storage |
| Credential Entry (TA0031) | Clipboard Knowledge (T1414) | SURXRAT collects Clipboard Knowledge |
| Assortment (TA0035) | Audio Seize (T1429) | SURXRAT can seize audio |
| Assortment (TA0035) | Knowledge from Native System (T1533) | SUXRAT collects information from exterior storage |
| Assortment (TA0035) | Location Monitoring (T1430) | SURXRAT Can acquire location |
| Assortment (TA0035) | Protected Person Knowledge: Name Log (T1636.002) | SURXRAT Collects name log |
| Assortment (TA0035) | Protected Person Knowledge: Contact Listing (T1636.003) | Collects contact knowledge |
| Assortment (TA0035) | Protected Person Knowledge: SMS Messages (T1636.004) | Collects SMS knowledge |
| Assortment (TA0035) | Protected Person Knowledge: Accounts (T1636.005) | SUXRAT collects Gmail account knowledge |
| Assortment (TA0035) | Video Seize (T1512) | SURXRAT Captures images utilizing the machine digital camera |
| Command and Management (TA0037) | Software Layer Protocol: Internet Protocols (T1437.001) | Malware makes use of HTTPs protocol |
| Exfiltration (TA0036) | Exfiltration Over C2 Channel (T1646) | SURXRAT sends collected knowledge to the C&C server |
| Influence (TA0034) | SMS Management (T1582) | SURXRAT can ship SMSs from the contaminated machine |
| Influence (TA0034) | Name Management (T1616) | SURXRAT could make calls |
| Influence (TA0034) | Knowledge Destruction (T1662) | Wipe exterior storage |
Indicators of Compromise (IOCs)
The IOCs have been added to this GitHub repository. Please evaluation and combine them into your Risk Intelligence feed to boost safety and enhance your total safety posture.

