{"id":56323,"date":"2024-06-11T00:00:00","date_gmt":"2024-06-11T00:00:00","guid":{"rendered":"urn:uuid:2aa9047b-8c48-84a8-58d8-cfe260f068f5"},"modified":"2024-06-11T00:00:00","modified_gmt":"2024-06-11T00:00:00","slug":"noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups\/","title":{"rendered":"Noodle RAT: Reviewing the Backdoor Used by Chinese-Speaking Groups"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/NoodleRAT-976:Large?qlt=80\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/24\/NoodleRAT-976.png\" class=\"ff-og-image-inserted\"><\/div>\n<p><b>Backdoor Commands<\/b><\/p>\n<p>During our analysis, we discovered that there are different types of Win.NOODLERAT that implement various command IDs. Based on one of the command IDs received upon successful authentication by the C&amp;C server, we categorized them into two clusters: Type 0x03A2 and Type 0x132A. The backdoor capability is implemented using a combination of major-ID and optional sub-ID. Table 1 lists the backdoor commands:<br \/>&nbsp;<\/p>\n<table cellpadding=\"1\" cellspacing=\"0\" border=\"1\" width=\"100%\" height=\"100%\">\n<tbody readability=\"10\">\n<tr>\n<td rowspan=\"2\"><b>Actions<\/b><\/td>\n<td width=\"235\" colspan=\"2\" valign=\"top\">\n<p><b>Type 0x03A2<\/b><\/p>\n<\/td>\n<td width=\"235\" colspan=\"2\" valign=\"top\">\n<p><b>Type 0x132A<\/b><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"118\" valign=\"top\">\n<p><b>Major-ID<\/b><\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p><b>Sub-ID<\/b><\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p><b>Major-ID<\/b><\/p>\n<\/td>\n<td width=\"118\">\n<p><b>Sub-ID<\/b><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"118\" valign=\"top\">\n<p>Successfully authorized<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x03A2<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>&#8211;<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x132A<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>&#8211;<\/p>\n<\/td>\n<\/tr>\n<tr readability=\"3\">\n<td width=\"118\" valign=\"top\" readability=\"5\">\n<p>Message of the end of command<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x0AC3<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>&#8211;<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x1AC3<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>&#8211;<\/p>\n<\/td>\n<\/tr>\n<tr readability=\"3\">\n<td width=\"118\" valign=\"top\" readability=\"5\">\n<p>Initialize module metadata<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x194C<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>&#8211;<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x294C<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>&#8211;<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"118\" valign=\"top\">\n<p>Receive module data<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x1AF2<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>&#8211;<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x2AC8<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>&#8211;<\/p>\n<\/td>\n<\/tr>\n<tr readability=\"3\">\n<td width=\"118\" valign=\"top\" readability=\"5\">\n<p>Launch module without pipe<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x1397<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>&#8211;<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x230E<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>&#8211;<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"118\" valign=\"top\">\n<p>Delete module metadata<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x1D50<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>&#8211;<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x2D06<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>&#8211;<\/p>\n<\/td>\n<\/tr>\n<tr readability=\"3\">\n<td width=\"118\" valign=\"top\" readability=\"5\">\n<p>Upload a file to C&amp;C server<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x390A<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x35C3 &amp; 0x35C4 &amp; 0x3013<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x590A<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x55C3 &amp; 0x55C4 &amp; 0x5013<\/p>\n<\/td>\n<\/tr>\n<tr readability=\"3\">\n<td width=\"118\" valign=\"top\" readability=\"5\">\n<p>List directories recursively<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x390A<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x35C5<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x590A<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x55C5<\/p>\n<\/td>\n<\/tr>\n<tr readability=\"9\">\n<td width=\"118\" valign=\"top\" readability=\"5\">\n<p>Download a file from C&amp;C server<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x390A<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\" readability=\"5\">\n<p>0x35C7 &amp; 0x35C8 &amp; 0x35C9 &amp; 0x3013<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x590A<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\" readability=\"5\">\n<p>0x55C7 &amp; 0x55C8 &amp; 0x55C9 &amp; 0x5013<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"118\" valign=\"top\">\n<p>Write given data to pipe<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x2099<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x2186<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x3099<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x3167<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"118\" valign=\"top\">\n<p>Write 0x32E0 to pipe<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x2099<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x220E<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x3099<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x32E0<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"118\" valign=\"top\">\n<p>Write 0x38AF to pipe<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x2099<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x28FA<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x3099<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x38AF<\/p>\n<\/td>\n<\/tr>\n<tr readability=\"3\">\n<td width=\"118\" valign=\"top\" readability=\"5\">\n<p>Send module data to another module<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x2099<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x2741<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x3099<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x3716<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"118\" valign=\"top\">\n<p>Same as 0x3099<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x2099<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x2A0B<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x3099<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x3A0B<\/p>\n<\/td>\n<\/tr>\n<tr readability=\"3\">\n<td width=\"118\" valign=\"top\" readability=\"5\">\n<p>Start TCP server to proxy packets to the C&amp;C server<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x2099<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x2CBD<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x3099<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x3CD0<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"118\" valign=\"top\">\n<p>Delete itself<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>N\/A<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>0x1C1C<\/p>\n<\/td>\n<td width=\"118\" valign=\"top\">\n<p>&#8211;<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Table 1. Backdoor commands of Win.NOODLERAT<\/p>\n<p>The first one, Type 0x03A2, implements most commands except the last one, deleting itself. This type of Win.NOODLERAT was used by Iron Tiger and other unknown clusters for espionage purposes, suggesting that this version could be a shared version.<\/p>\n<p>The second one, Type 0x132A, implements full features. This type of Win.NOODLERAT was used only by Calypso APT. Therefore, this is likely an exclusive version.<\/p>\n<p>Interestingly, upon comparing the command IDs, we found that some have similar parts. For instance, the command IDs to upload a file to the C&amp;C server are 0x390A and 0x590A respectively; this similarity might be an indicator of versioning, but there is not enough evidence to conclude such.<\/p>\n<p><b><span class=\"body-subhead-title\">Linux.NOODLERAT<\/span><\/b><\/p>\n<p>Linux.NOODLERAT is an ELF version of Noodle RAT, but with a different design. This backdoor has been used by several groups with various motivations, such as Rocke (Iron Cybercrime Group) <a href=\"https:\/\/blog.talosintelligence.com\/rocke-champion-of-monero-miners\/\" target=\"_blank\" rel=\"noopener\">for financial gains<\/a><\/p>\n<p>Cloud Snooper Campaign <a href=\"https:\/\/www.sophos.com\/en-us\/medialibrary\/PDFs\/technical-papers\/sophoslabs-cloud-snooper-report.pdf\" target=\"_blank\" rel=\"noopener\">for espionage<\/a>, and an unknown cluster also for spying purposes. Since it\u2019s designed differently, its backdoor capabilities are also slightly different:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Reverse shell<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Download &amp; Upload files<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Scheduling execution<\/span><\/li>\n<li><span class=\"rte-red-bullet\">SOCKS tunneling<\/span><\/li>\n<\/ul>\n<p><b>Initialization<\/b><\/p>\n<p>In most cases, Linux.NOODLERAT was deployed as an additional payload of an exploit against public-facing applications. After deployment, the backdoor copies itself to \/tmp\/CCCCCCCC and performs process name spoofing by overwriting \u201cargv.\u201d Then, it decrypts the embedded config by RC4 with the hardcoded key, \u201cr0st@#$.\u201d The decrypted config is formatted as shown in the diagram below; Linux.NOODLERAT will connect to the defined C&amp;C server based on the config.<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/24\/f\/noodle-rat-reviewing-the-new-backdoor-used-by-chinese-speaking-g.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This blog entry provides an analysis of the Noodle RAT backdoor, which is likely being used by multiple Chinese-speaking groups engaged in espionage and other types of cybercrime. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":56324,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,9508,9513,9509],"class_list":["post-56323","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-endpoints","tag-trend-micro-research-malware","tag-trend-micro-research-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Noodle RAT: Reviewing the Backdoor Used by Chinese-Speaking Groups 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Noodle RAT: Reviewing the Backdoor Used by Chinese-Speaking Groups 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-11T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/NoodleRAT-976:Large?qlt=80\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Noodle RAT: Reviewing the Backdoor Used by Chinese-Speaking Groups\",\"datePublished\":\"2024-06-11T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups\\\/\"},\"wordCount\":567,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups.png\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Endpoints\",\"Trend Micro Research : Malware\",\"Trend Micro Research : Research\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups\\\/\",\"name\":\"Noodle RAT: Reviewing the Backdoor Used by Chinese-Speaking Groups 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups.png\",\"datePublished\":\"2024-06-11T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups.png\",\"width\":976,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Noodle RAT: Reviewing the Backdoor Used by Chinese-Speaking Groups\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Noodle RAT: Reviewing the Backdoor Used by Chinese-Speaking Groups 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups\/","og_locale":"en_US","og_type":"article","og_title":"Noodle RAT: Reviewing the Backdoor Used by Chinese-Speaking Groups 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-06-11T00:00:00+00:00","og_image":[{"url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/NoodleRAT-976:Large?qlt=80","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Noodle RAT: Reviewing the Backdoor Used by Chinese-Speaking Groups","datePublished":"2024-06-11T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups\/"},"wordCount":567,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/06\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups.png","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Endpoints","Trend Micro Research : Malware","Trend Micro Research : Research"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups\/","url":"https:\/\/www.threatshub.org\/blog\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups\/","name":"Noodle RAT: Reviewing the Backdoor Used by Chinese-Speaking Groups 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/06\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups.png","datePublished":"2024-06-11T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/06\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/06\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups.png","width":976,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/noodle-rat-reviewing-the-backdoor-used-by-chinese-speaking-groups\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"Noodle RAT: Reviewing the Backdoor Used by Chinese-Speaking Groups"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/56323","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=56323"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/56323\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/56324"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=56323"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=56323"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=56323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}