Trochilus RAT
Description
Despite that the RAT was designed to execute in the memory of the machine (thus evading detection by AV software), ASERT researchers obtained the RAT’s source code and connected it to a GitHub profile of a user named 5loyd.
On the GitHub page, the RAT has been advertised as a fast and free Windows remote administration tool. Other details include: • Written in CC+; • Supports various communication protocols; • Has a file manager module, a remote shell, a non-UAC mode; • Able to uninstall itself; • Able to upload information from remote machines; • Able to download an execute files.
Researchers believe that 5loys is not a part of Group 27. More likely, the user’s profile has been hijacked by the group and used for their own purposes.
Names
Name |
---|
Trochilus RAT |
Category
Malware
Type
- Reconnaissance
- Backdoor
- Info stealer
- Downloader
Information
- https://sensorstechforum.com/trochilus-plugx-rats-in-targeted-attacks-on-governments/
- https://github.com/5loyd/trochilus/
- https://asert.arbornetworks.com/uncovering-the-seven-pointed-dagger/
- https://github.com/m0n0ph1/malware-1/tree/master/Trochilus
- https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf
Malpedia
Alienvault Otx
Other Information
Uuid
cfb2355d-e43d-43b7-8033-0fcba988db50
Last Card Change
2020-05-14