tRat Remote Access Trojan
tRat is a newly observed remote access trojan (RAT) that is being distributed by the APT group, TA505. It is believed to be targeting users at commercial banking institutions.
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
tRat is a newly observed remote access trojan (RAT) that is being distributed by the APT group, TA505. It is believed to be targeting users at commercial banking institutions.
Affected platforms
The following platforms are known to be affected:
Threat details
tRat is being delivered via Microsoft Word and Publisher documents in spam email campaigns. In the most recently observed campaign, distributed by TA505, users received either a spoofed Word or Publisher file stating to enable macros in order to view it. Enabling macros triggers the installation of the RAT. Previous campaigns, not distributed by TA505, have been observed to utilise only Word documents, but using the same process of enabling macros to install the malware.
Once tRat is installed, it will connect to a command and control server over TCP port 80 in order for data encryption and hex-encoded transmission. The RAT is capable of using infected devices to gather information, load additional malware and scan for system vulnerabilities.
Remediation steps
| Type | Step |
|---|---|
|
To prevent and detect a trojan infection, ensure that:
|
Last edited: 17 February 2020 12:59 pm