Java/Ratty [Threat Name] go to Threat

Java/Ratty.A [Threat Variant Name]

Category trojan
Size 340723 B
Aliases Trojan.Java.Ratty.a (Kaspersky)
Short description

The trojan serves as a backdoor. It can be controlled remotely.

Installation

When executed, the trojan copies itself in some of the the following locations:

  • Macintosh HD/Library/Startup/%malwarefilename% (Mac OSX)
  • %appdata%\­Microsoft\­Windows\­Start Menu\­Programs\­Startup\­%malwarefilename% (Microsoft Windows)
  • %appdata%\­%malwarefilename% (Microsoft Windows)

This causes the trojan to be executed on every system start.


In order to be executed on every system start, the trojan sets the following Registry entry:

  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­Run]
    • "%malwarefilename%" = "%appdata%\­%malwarefilename%"
Information stealing

The trojan collects the following information:

  • computer name
  • user name
  • operating system version
  • CPU information
  • amount of operating memory
  • data from the clipboard

The trojan is able to log keystrokes.


The trojan can send the information to a remote machine.

Other information

The trojan acquires data and commands from a remote computer or the Internet.


The trojan contains a URL address. The TCP protocol is used in the communication.


It can execute the following operations:

  • download files from a remote computer and/or the Internet
  • run executable files
  • send files to a remote computer
  • execute shell commands
  • open a specific URL address
  • send gathered information
  • send the list of disk devices and their type to a remote computer
  • send the list of files on a specific drive to a remote computer
  • create folders
  • delete files
  • capture screenshots
  • capture webcam video/voice
  • play sound/video
  • display a dialog window
  • shut down/restart the computer
  • simulate user's input (clicks, taps)

The trojan can be used to gain full access to the compromised computer.


The trojan may execute the following commands:

  • REG ADD HKCU\­Software\­Microsoft\­Windows\­CurrentVersion\­Run /v "%malwarefilename%" /d "appdata%\­%malwarefilename%" /f
  • attrib +H %appdata%\­Microsoft\­Windows\­Start Menu\­Programs\­Startup\­%malwarefilename%
  • attrib +H %appdata%\­%malwarefilename%
  • sudo shutdown -h now
  • shutdown /s /t 0
  • shutdown /r /t 0

Please enable Javascript to ensure correct displaying of this content and refresh this page.