NewCore RAT

Description

(Fortinet) This RAT is a DLL file. Its malicious routines are contained in its imported function “ProcessTrans”. However, executing the DLL without using the downloader will not work as the C&C server string is not embedded in its body. When the downloader calls the function “ProcessTrans”, it supplies to the function the C&C server string and a handle to the C&C server internet session. In this case, Heuristic detection based on behavior will not work on the DLL alone.

This RAT is capable of the following:

• Shutdown the machine • Restart the machine • Get disk list • Get directory list • Get file information • Get disk information • Rename files • Copy files • Delete files • Execute files • Search files • Download files • Upload files • Screen monitoring • Start command shell

NewCore RAT may just be a rehashed PCClient RAT, but it proves to be effective in evading AV detection by using a combination of simple techniques such as DLL-hijacking, file-less execution of downloaded malware, and passing C&C information as parameter from downloader to the downloaded file.

Names

Name
NewCore RAT

Category

Malware

Type

  • Reconnaissance
  • Backdoor
  • Keylogger
  • Info stealer
  • Exfiltration
  • Tunneling

Information

Malpedia

Alienvault Otx

Other Information

Uuid

55a366cc-0771-4854-85a3-5eed99e33f9e

Last Card Change

2020-06-04