Author: Kamila Babayeva (kamifai14@gmail.com, @_kamifai_), Student Researcher at the Stratosphere Laboratory. https://www.stratosphereips.org/
RAT downloaded from: https://github.com/karma9874/AndroRAT
Executed RAT Contoller Environment:
Executed Victim Environment:
Phone Status Before The Infection:
RAT APK (RAT08_cli_AndroRAT.apk):
- File Name when put in the phone: evil.apk
Packet Capture (RAT08_cli_AndroRAT.pcap):
- Controller IP: 147.32.83.157
- Victim IP: 147.32.83.245
- First Packet of the Infection: 1431
- UTC Time of the Infection: 2020-12-05 11:46:43 UTC
The traffic was captured on the host interface. All captures were done in CEST time (GMT+2). Which means that your tools looking at the pcap files may show a different time depending on your time zone. Since the time of capture inside the pcap file is 000000, then if you are in timezone GMT+1, you will see in your tools the packets with 1hs less of when they were captured. The real capture time is in the log file.
Files with information about this execution:
- Log file RAT08_cli_AndroRAT.log - very detailed and specific time log of all the actions performed in the client and the server during the experiment, such as taking a picture, etc.
- Screenshots folder RAT08_cli_AndroRAT_screenshots - a folder with screenshots of the mobile device and controller while performing the actions on the client and server
- Packet capture RAT08_cli_AndroRAT.pcap - network traffic captured on the victim’s device
- APK RAT08_cli_AndroRAT.apk- APK generated by the RAT’s builder
- Folder RAT08_cli_AndroRAT_zeek - generated Zeek logs of RAT08_cli_AndroRAT.pcap