Hacking with Remote Admin
Tools (RATs)
Zoltan Balazs
CTO @MRG Effitas
Budapest IT Security Meetup
January 2014
Remote admin tools
Could be legitimate
Usually it is not

All the features for remote administration
Upload/download files
Registry editor
Shell commands
Remote desktop

Using RAT might be illegal, and might be
considered as a crime!
Don’t try this at home!
Why are these skiddie toolz
important?
Only pentesters use meterpreter
Script kiddies use RATs
Not just "1337 |-|4x0r5” use RATs!

Know your enemy!
Malware incident response
Forensic investigation
Typical RAT scenario
1998
DEF CON 6 on August 1, 1998
Dictionary to skiddie language
Skiddie world
server
client
FUD
cryptor
private/elite/gold version

Average world
client malware on victim
server code @skiddie
Fully UnDetectable
some lame packer
full version (not demo)
Tutorialz for script bunniez
How to fail at OPSEC?
https://www.youtube.com/results?
search_query=setup+rat+tutorial
http://www.youtube.com/watch?v
=NkkqPLVscC4
#opsecfail
#opsecfail
#opsecfail
#opsecfail
#opsecfail
The skiddie’s youtube list on Cyber Threat Task Force (google cache only)
But a script kitty’s life is not just about
work
But FUN as well!
Fun manager - Fun menu
Extra fun
Fun feature 3
Fun feature 4 – Matrix chat
Fun feature 5
Ultimate fun …
Ultimate fun feature 6 - Piano
Hacking Internet Explorer
Scary features
Scary feature 1
DLL inject into iexplore.exe
Proxy aware
Transparent proxy authentication
Local software firewall bypass
No new process running
Scary feature 2 – Melt/uninstall
Melt server deletes the
dropper
No wipe
Forensics restoration
possible

Uninstall server deletes
the persistence file
No wipe
Forensics restoration
possible
Scary feature - Alternate data stream
Scary feature 3 - Anti AV
Scary feature 4 – Anti VM, Anti
sandbox
Private/elite version
Downloading and running binaries from people
like this is a bad idea!
hxxp://www.theatregelap.com/2012/06/xtreme
rat-v-36-private.html
JRAT
Multiplatform
Evade some software firewalls
(java.exe allowed)
Easier to obfuscate
Screenshots ©Symantec
AndroRAT

© VRT Snort blog
Cryptor
High profile attacks
High profile
attacks
 Hacking with Remote Admin Tools (RAT)
 Hacking with Remote Admin Tools (RAT)

Hacking with Remote Admin Tools (RAT)