Index of /publicDatasets/Android-Mischief-Dataset/AndroidMischiefDataset_v2/RAT02_DroidJack

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]RAT02_DroidJack.apk.zip2023-04-18 09:27 252K 
[   ]RAT02_DroidJack.log2021-05-07 15:53 7.5K 
[   ]RAT02_DroidJack.pcap2021-05-07 15:53 52M 
[DIR]RAT02_DroidJack_screenshots/2021-05-07 15:53 -  
[DIR]RAT02_DroidJack_zeek/2021-05-07 15:53 -  
[TXT]README.html2021-05-07 15:53 2.6K 
[TXT]README.md2021-05-07 15:53 2.2K 

Details of the execution of the RAT DroidJack v4.4

Author: Kamila Babayeva (kamifai14@gmail.com, @_kamifai_), Student Researcher at the Stratosphere Laboratory. https://www.stratosphereips.org/

RAT downloaded from: https://www.tutorialjinni.com/droidjack-android-rat-download.html

Executed RAT Contoller Environment:

Executed Victim Environment:

Phone Status Before The Infection:

RAT APK (RAT02_DroidJack.apk):

- App Name: droidjack-app
- File Name: droidjack
- File Name when put into the phone: 25ccf2dcb3d3400d7de88ee187d2fce6.apk (md5 of the apk)

Packet Capture (RAT02_DroidJack.pcap):

- Controller IP: 147.32.83.253
- Victim IP: 10.8.0.57
- First Packet of the Infection: 54650
- UTC Time of the Infection: 2020-08-01 14:10:43

The phone was using the EVPN (https://www.civilsphereproject.org/emergency-vpn) to capture its traffic. All captures were done in CEST time (GMT+2). Which means that your tools looking at the pcap files may show a different time depending on your time zone. Since the time of capture inside the pcap file is 000000, then if you are in timezone GMT+1, you will see in your tools the packets with 1hs less of when they were captured. The real capture time is in the log file.

Files with information about this execution:

- Log file RAT02_DroidJack.log - very detailed and specific time log of all the actions performed in the client and the server during the experiment, such as taking a picture, etc.
- Screenshots folder RAT02_DroidJack_screenshots - a folder with screenshots of the mobile device and controller while performing the actions on the client and server
- Packet capture RAT02_DroidJack.pcap - network traffic captured on the victim’s device
- APK RAT02_DroidJack.apk - APK generated by the RAT’s builder
- Folder RAT02_DroidJack_zeek - generated Zeek logs of RAT02_DroidJack.pcap