LimeRevenge RAT

Remote Access Trojans (which are often referred to as RATs for short) are a very malware type. Nearly anyone can get their hands on a RAT even if they do not have the capabilities to build one themselves. This threat is available for purchase readily and to be rented on underground hacking forums. One can even opt to use a free RAT even though these are likely to be of lower quality compared to the paid ones. The more high-end RATs are better at remaining under the radar of their victim and any potential anti-virus applications. This allows its operators to have access to the compromised host for long periods and cause more damage. A RAT which is popular with both less experienced cybercriminals and highly-skilled cyber crooks is the RevengeRAT. Cybersecurity experts have stumbled upon a new and upgraded variant of the classic RevengeRAT recently. Its name is LimeRevenge RAT.

Similar to njRAT Lime Edition and RevengeRAT

The reason that this new variant was given the name LimeRevenge RAT is that it has code borrowed not only from the RevengeRAT threat but also from the njRAT Lime Edition hacking tool. It is not known if the same hacking group has developed these threats, but some malware researchers speculate that this may be exactly the case. Despite this being a new variant of the RevengeRAT, it does not seem to feature any particularly impressive properties. However, this does not mean that the LimeRevenge RAT is harmless, not at all. This RAT is still functional and allows its operators to gain access to the compromised host and cause a fair bit of damage.

Capabilities

Once the LimeRevenge RAT manages to infiltrate the targeted host, it will allow the attackers to:

  • Run a keylogger feature.
  • Manage the running services and processes.
  • Execute Power Shell commands.
  • Execute remote commands.
  • Collect information about the system’s hardware and software.
  • Browse files.
  • Download files.
  • Move files.
  • Copy files.
  • Delete files.

The LimeRevenge RAT is a very potent threat and may be propagated through numerous infection vectors. Make sure to use a legitimate anti-malware application that will keep your system secure.

Trending

Most Viewed

Loading...