Home Malware Programs Remote Administration Tools Shady Rat

Shady Rat

Posted: April 11, 2014

Threat Metric

Threat Level: 1/10
Infected PCs: 56
First Seen: April 11, 2014
Last Seen: February 13, 2021
OS(es) Affected: Windows


The Shady Rat is a Remote Access Tool, or RAT, that grants third parties control over the compromised computer, including the ability to send commands, change system settings, delete files or collect information. The Shady Rat is closely connected to a supporting PC threat, Trojan.Downbot, and boasts a campaign that has been called one of the widespread acts of cyber aggression in the history of threats. Malware researchers confirmed an e-mail's predominant exploitation for spreading the Shady Rat, and any computers suspected to be compromised should enable anti-malware tools for deleting the Shady Rat and related PC threats immediately.

The Trojan that Hides in the Shadow of Art

RATs and backdoor Trojans often have a limited, but highly invasive set of functions, most of which are designed around allowing evil-minded persons to control your PC by sending instructions to the associated threats. The Shady Rat exemplifies how otherwise simple RATs may be used to great effect, and has been responsible for compromising business and government computers around the world. Ironically, this data was gathered by the Shady Rat, itself, which uploaded it to an inadequately secured server, enabling PC security experts to peruse the database.

Many attacks against corporate and government PC users start with e-mail spam, and malware researchers verified that the Shady Rat also uses this method to distribute itself. These messages include the installer for the Shady Rat as a file attachment, which frequently is a Microsoft Excel file or Word document. With its installation out of the way, the Shady Rat uses an unorthodox but effective method to conceal its communications with the Command & Control server: steganography. The Shady Rat conceals unsafe code inside of seemingly safe image files, which malware researchers warn makes its threatening behavior particularly difficult to detect, even by otherwise competent anti-malware solutions.

The Shady Rat is not the only threat to use this technique, which remains limited in use to a small number of particularly advanced PC threats, such as Alueron and some variants of the banking Trojan Trojan Zeus. All of these PC threats include broad functions for compromising a PC, collecting information and installing other threats.

The Dangers of a Computer Overshadowed by the Shady Rat

The Shady Rat may not provide any brilliantly new functions, but what features the Shady Rat does possess are more than ample for allowing cybercrooks to compromise entire corporate networks. Central attacks by the Shady Rat include:

  • Enabling a hibernation mode that temporarily terminates the Shady Rat, which may be used to evade anti-malware tools.
  • Opening connections to specified servers through any specified port.
  • Enabling a remote shell that allows other persons to run arbitrary commands on your PC as if it were their own machine. The Shady Rat also may transmit the results of any commands executed.
  • The Shady Rat may upload files arbitrarily, allowing the Shady Rat to collect information.

Even if none of these functions are adequate for compromising a PC fully, the Shady Rat also may install other threats, enabling secondary PC threats to cover over any limitations in its attacks.

Using general anti-malware procedures for removing the Shady Rat and all related threats should be an urgent priority for any compromised PC's user. Needless to say, malware researchers also emphasize safe interactions with suspicious e-mail files, which continue to be one of the primary sources of attacks against government agencies and companies using otherwise secure networks.

Technical Details

Additional Information

The following URL's were detected:
http://firesear.ch/search?q=
Loading...