Home Malware Programs Remote Administration Tools Drat

Drat

Posted: March 28, 2006

A RAT application works by a simple but effective principle: the hacker infects the machine with a "server" application via the e-mail or File and Print Sharing computer and can control it, using a "client" on his PC. Originated in September 200

File System Modifications

  • The following files were created in the system:
    # File Name
    1 [system
    2 cbj.dll
    3 drat setup util.exe
    4 drat.exe
    5 drat_comp.header
    6 dratfile_gui.exe
    7 drattheworldsultimatevirtualspy.doc
    8 init_asm.bin
    9 shell32.exe

Registry Modifications

  • The following newly produced Registry Values are:
    HKEY..\..\..\..{RegistryKeys}HKEY_CLASSES_ROOTauthidentauthidentkey

Related Posts

Loading...