PeaRAT Remote Access Trojan
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Affected platforms
The following platforms are known to be affected:
Threat details
PeaRAT is distributed via phishing campaigns using attachments containing an encrypted copy of PeaZIP, a popular file archiving tool. This file is then decrypted and automatically executed to install PeaRAT.
Once on a device, PeaRAT will launch a child process within the user's Music folder (if available) before writing the IP address of its command and control server to the device's memory. It will then begin exfiltrating user data from the device but can also alter processes and install secondary malware.
Remediation advice
To prevent and detect a trojan infection, ensure that:Remediation steps
| Type | Step |
|---|---|
|
Last edited: 17 February 2020 12:52 pm