Schrödinger’s RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem presented at 27thUsenixSecuritySymposium 2018

by Damon Mccoy, Kirill Levchenko, Paul Pearce, Hitesh Dharmdasani, Brown Farinholt, Mohammad Rezaeirad,

URL : https://www.usenix.org/conference/usenixsecurity18/presentation/rezaeirad

Summary : Remote Access Trojans (RATs) are a class of malware that give an attacker direct, interactive access to a victim’s personal computer, allowing the attacker to steal private data stored on the machine, spy on the victim in real-time using the camera and microphone, and interact directly with the victim via a dialog box. RATs have been used for surveillance, information theft, and extortion of victims.In this work, we report on the attackers and victims for two popular RATs, njRAT and DarkComet. Using the malware repository VirusTotal, we find all instances of these RATs and identify the domain names of the controllers. We then register those domains that have expired and direct them to our measurement infrastructure, allowing us to determine the victims of these campaigns. We investigated several techniques for excluding network scanners and sandbox executions of the malware sample in order to exclude apparent infections that are not real victims of the campaign. Our results show that over 99% of the 828,137 IP addresses that connected to our sinkhole are likely not real victims. We report on the number of victims, how long RAT campaigns remain active, and the geographic relationship between victims and attackers.