Yes, you can spot bot commands, server usernames/passwords, remote requests for api hooks, etc. You just have to know what to look for, and if it's there you'll see it.
This was all the rage in 2008. Skids would setup bots/rats/stealers, and people that knew what they were doing would infect themselves, take over the command and control servers, and take everything away from the script kids.