Nuclear RAT

Nuclear Remote Administration Tool
Common name Nuclear RAT
Technical name Nuclear Remote Administration Tool
Aliases Backdoor.Delf.jl, Backdoor.Delf.jw, Backdoor.Win32.Nuclear.b, Win-Trojan/NucRAT, Win-Trojan:NucRAT, Win32/Nuclear.AG, Backdoor.Win32.Nuclear.ak
Family Nuclear RAT
Classification Trojan
Type Windows NT, Windows 2000, Windows XP, Windows Server 2003
Subtype Backdoor
Isolation 2003 - present (new variants being released)
Point of isolation Unknown
Point of Origin Brazil
Author(s) caesar2k

Nuclear RAT (short for Nuclear Remote Administration Tool) is a backdoor trojan horse that infects Windows NT family systems (Windows 2000, XP, 2003).[1] It uses a server creator, a client and a server to take control over a remote computer. It uses process hijacking to fool the firewall, and allows the server component to hijack processes and gain rights for accessing the internet.

The server component (217,600 bytes) is dropped under Windows, System32, or Program Files folders, under a custom named folder; the default is NR. Once the server component is run, it tries to connect to its client, that listens for incoming connections on a configurable port, to allow the attacker to execute arbitrary code from his or her computer.

The server editor component has the following capabilities:

The client component has the following capabilities:

Older versions of this malware had ability to change their look through using skinnable windows.

References

  1. ^ "Spyware Detail Nuclear RAT 1.0b1". Computer Associates. August 16, 2004. http://www.ca.com/securityadvisor/pest/pest.aspx?id=453078396. Retrieved 2009-03-01. 

See also

Reverse connection

External links