{"id":84515,"date":"2017-07-17T12:11:56","date_gmt":"2017-07-17T06:41:56","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=84515"},"modified":"2017-07-17T12:17:34","modified_gmt":"2017-07-17T06:47:34","slug":"technical-analysis-java-rat-remote-access-trojan-malware-2","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/technical-analysis-java-rat-remote-access-trojan-malware-2\/","title":{"rendered":"A technical analysis of the Java RAT (Remote Access Trojan) Malware"},"content":{"rendered":"<p>Remote Access Trojans are programs that allow attackers to gain unauthorized access to a targeted computer without the victim\u2019s knowledge. Java RAT malware is a Trojan-Dropper written in Java. It is designed to steal passwords, access files, for keylogging (recording what the user types on the keyboard) and for screen-capture. Information collected by a RAT is forwarded to a remote server controlled by the attacker.<\/p>\n<p><strong>Distribution Method<\/strong><br \/>\nA Java RAT malware arrives via spam emails that contain malicious attachments (fig 1).<\/p>\n<figure id=\"attachment_84509\" aria-describedby=\"caption-attachment-84509\" style=\"width: 781px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-84509\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/07\/Java-Rat1.png\" alt=\"java-rat1\" width=\"781\" height=\"607\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Java-Rat1.png 820w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Java-Rat1-300x233.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Java-Rat1-768x597.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Java-Rat1-502x390.png 502w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Java-Rat1-789x613.png 789w\" sizes=\"(max-width: 781px) 100vw, 781px\" \/><figcaption id=\"caption-attachment-84509\" class=\"wp-caption-text\">Fig 1<\/figcaption><\/figure>\n<p><strong>How Java RAT gets into a system<\/strong><\/p>\n<p>Once a JAR file is executed, it drops a copy of itself onto the below path with the name \u2018LyOCtxhwRyz.yrDUql\u2019<\/p>\n<p>Path: %userprofile%\\ YzQqKjGoxHz(Hidden Folder)<\/p>\n<p>For example,\u00a0 C:\\Users\\Public\\YzQqKjGoxHz<\/p>\n<figure id=\"attachment_84508\" aria-describedby=\"caption-attachment-84508\" style=\"width: 626px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84508\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/07\/Java-Rat2.png\" alt=\"Fig 2\" width=\"626\" height=\"259\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Java-Rat2.png 626w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Java-Rat2-300x124.png 300w\" sizes=\"(max-width: 626px) 100vw, 626px\" \/><figcaption id=\"caption-attachment-84508\" class=\"wp-caption-text\">Fig 2<\/figcaption><\/figure>\n<p><strong>The malware drops the following files:<\/strong><\/p>\n<p>C:\\Users\\Public\\YzQqKjGoxHz\\ID.txt<\/p>\n<p>C:\\Users\\Public\\AppData\\Local\\Temp\\OlfYXmVqfL9024669788070560515.reg<\/p>\n<p>%temp%\\Retrive2638932198378221530.vbs<\/p>\n<p>%temp%\/\\ _0.354484486304158635925511204328476438.class<\/p>\n<p>%Application Data%\\Oracle\\ (Contains copy of files from java installation folder)<\/p>\n<p><strong>It creates the following folders:<\/strong><\/p>\n<p>C:\\Users\\Public\\YzQqKjGoxHz (Contains copy of actual malware i.e JAR file)<\/p>\n<p>C:\\Users\\Public\\fUTkALeaTxM<\/p>\n<p>The below registry entry dropped by the malware is used to launch itself every time the system boots and download the executable file to infect the system.<\/p>\n<figure id=\"attachment_84511\" aria-describedby=\"caption-attachment-84511\" style=\"width: 711px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84511\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/07\/Java-Rat3.png\" alt=\"Fig 3\" width=\"711\" height=\"155\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Java-Rat3.png 711w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Java-Rat3-300x65.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2017\/07\/Java-Rat3-650x142.png 650w\" sizes=\"(max-width: 711px) 100vw, 711px\" \/><figcaption id=\"caption-attachment-84511\" class=\"wp-caption-text\">Fig 3<\/figcaption><\/figure>\n<p>The malware adds the below registry entries to disable security solutions and different analysis tools.<\/p>\n<p>[HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Image File Execution Options\\procexp.exe]<\/p>\n<p>&#8220;debugger&#8221;=&#8221;svchost.exe&#8221;<\/p>\n<p>[HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Image File Execution Options\\wireshark.exe]<\/p>\n<p>&#8220;debugger&#8221;=&#8221;svchost.exe&#8221;<\/p>\n<p>[HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Image File Execution Options\\SCANNER.EXE]<\/p>\n<p>&#8220;debugger&#8221;=&#8221;svchost.exe&#8221;<\/p>\n<p><strong>Quick Heal Detection<\/strong><\/p>\n<p>Quick Heal real-time protection detects the JAR file and its component as \u2018Trojan.JAVA.Agent.JRAT\u2019 and \u2018Trojan.JAVA.Agent.JJ\u2019<\/p>\n<figure id=\"attachment_84510\" aria-describedby=\"caption-attachment-84510\" style=\"width: 296px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-84510\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2017\/07\/Java-Rat4.png\" alt=\"Fig 4\" width=\"296\" height=\"160\" \/><figcaption id=\"caption-attachment-84510\" class=\"wp-caption-text\">Fig 4<\/figcaption><\/figure>\n<p><strong>Security measures to stay away from Java RAT <\/strong><\/p>\n<ol>\n<li>Do not click on links or download attachments that arrive in emails from unwanted or unexpected sources.<\/li>\n<li>Apply recommended security updates for your computer\u2019s Operating System and all other programs such as Adobe, Java, Internet browsers, etc.<\/li>\n<li>Use an antivirus software that gives layers of protection against infected emails and malicious websites. Keep the software up-to-date.<\/li>\n<li>Take regular backups of your important data.<\/li>\n<li>Free software, especially those with unverified publishers are usually used by attackers to spread malware. Always go for genuine and licensed software.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><strong>ACKNOWLEDGMENT<br \/>\n<\/strong>Subject Matter Expert<\/p>\n<ul>\n<li>Anita Ladkat | Quick Heal Security Labs<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Remote Access Trojans are programs that allow attackers to gain unauthorized access to a targeted computer without the victim\u2019s knowledge. Java RAT malware is a Trojan-Dropper written in Java. It is designed to steal passwords, access files, for keylogging (recording what the user types on the keyboard) and for screen-capture. Information collected by a RAT [&hellip;]<\/p>\n","protected":false},"author":29,"featured_media":84512,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24,5],"tags":[1478,1477],"class_list":["post-84515","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware","category-security","tag-java-rat-malware","tag-remote-access-trojan"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/84515"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=84515"}],"version-history":[{"count":3,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/84515\/revisions"}],"predecessor-version":[{"id":84518,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/84515\/revisions\/84518"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/84512"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=84515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=84515"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=84515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}