Trochilus RAT

Description

Despite that the RAT was designed to execute in the memory of the machine (thus evading detection by AV software), ASERT researchers obtained the RAT’s source code and connected it to a GitHub profile of a user named 5loyd.

On the GitHub page, the RAT has been advertised as a fast and free Windows remote administration tool. Other details include: • Written in CC+; • Supports various communication protocols; • Has a file manager module, a remote shell, a non-UAC mode; • Able to uninstall itself; • Able to upload information from remote machines; • Able to download an execute files.

Researchers believe that 5loys is not a part of Group 27. More likely, the user’s profile has been hijacked by the group and used for their own purposes.

Names

Name
Trochilus RAT

Category

Malware

Type

  • Reconnaissance
  • Backdoor
  • Info stealer
  • Downloader

Information

Malpedia

Alienvault Otx

Other Information

Uuid

cfb2355d-e43d-43b7-8033-0fcba988db50

Last Card Change

2020-05-14