Details of the execution of the RAT AhMyth

Author: Kamila Babayeva (kamifai14@gmail.com, @_kamifai_), Student Researcher at the Stratosphere Laboratory. https://www.stratosphereips.org/

RAT downloaded from: https://github.com/AhMyth/AhMyth-Android-RAT

Executed RAT Controller Environment:

Executed Victim Environment:

Phone Status Before The Infection:

RAT APK (RAT07_AhMyth.apk):

- File Name when put into the phone: Ahmyth.s.apk

Packet Capture (RAT07_AhMyth.pcap):

- Controller IP: 147.32.83.230
- Victim IP: 10.8.0.117
- First Packet of the Infection: 43577
- UTC Time of the Infection: 2020-09-02 14:38:53

The phone was using the EVPN (https://www.civilsphereproject.org/emergency-vpn) to capture the traffic. All captures were done in CEST time (GMT+2). Which means that your tools looking at the pcap files may show a different time depending on your time zone. Since the time of capture inside the pcap file is 000000, then if you are in timezone GMT+1, you will see in your tools the packets with 1hs less of when they were captured. The real capture time is in the log file.

Files with information about this execution:

- Log file RAT07_AhMyth.log - very detailed and specific time log of all the actions performed in the client and the server during the experiment, such as taking a picture, etc.
- Screenshots folder RAT07_AhMyth_screenshot - a folder with screenshots of the mobile device and controller while performing the actions on the client and server
- Packet capture RAT07_AhMyth.pcap - network traffic captured on the victim’s device
- APK RAT07_AhMyth.apk- APK generated by the RAT’s builder
- Folder RAT07_AhMyth_zeek - generated Zeek logs of RAT07_AhMyth.pcap