Despite that the RAT was designed to execute in the memory of the machine (thus evading detection by AV software), ASERT researchers obtained the RAT’s source code and connected it to a GitHub profile of a user named 5loyd. On the GitHub page, the RAT has been advertised as a fast and free Windows remote administration tool. Other details include: • Written in CC+; • Supports various communication protocols; • Has a file manager module, a remote shell, a non-UAC mode; • Able to uninstall itself; • Able to upload information from remote machines; • Able to download an execute files. Researchers believe that 5loys is not a part of Group 27. More likely, the user’s profile has been hijacked by the group and used for their own purposes.
TA0043 | TA0042 | TA0001 | TA0002 | TA0003 | TA0004 | TA0005 | TA0006 | TA0007 | TA0008 | TA0009 | TA0011 | TA0010 | TA0040 |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
IP:Port | Timestamp |
---|
Domain | Timestamp |
---|
URL | Timestamp |
---|
2022-09-15 by Threat Hunter Team from Symantec
2022-09-13 by Threat Hunter Team from Symantec
2022-04-27 by Daniel Lunghi from Trendmicro
2021-01-15 by Markus Neis from Swisscom
2020-06-24 by Counter Threat Unit ResearchTeam from
2020-06-03 by Daniel Lunghi from Trend Micro
2020-02-18 by Daniel Lunghi from Trend Micro
2020 by SecureWorks from Secureworks
2019-02-06 by Insikt Group from Recorded Future
2017-11-03 by 5loyd from Github (5loyd)
2017-04-03 by Shusei Tomonaga from JPCERT/CC
2017-04 by PricewaterhouseCoopers from PricewaterhouseCoopers
2015-08 by ASERT Team from Arbor Networks
Tool: Trochilus RAT
Names: Trochilus RAT
Description: Despite that the RAT was designed to execute in the memory of the machine (thus evading detection by AV software), ASERT researchers obtained the RAT’s source code and connected it to a GitHub profile of a user named 5loyd. On the GitHub page, the RAT has been advertised as a fast and free Windows remote administration tool. Other details include: • Written in CC+; • Supports various communication protocols; • Has a file manager module, a remote shell, a non-UAC mode; • Able to uninstall itself; • Able to upload information from remote machines; • Able to download an execute files. Researchers believe that 5loys is not a part of Group 27. More likely, the user’s profile has been hijacked by the group and used for their own purposes.
Category: Malware
Type: Reconnaissance, Backdoor, Info stealer, Downloader
Information: https://sensorstechforum.com/trochilus-plugx-rats-in-targeted-attacks-on-governments/
Information: https://github.com/5loyd/trochilus/
Information: https://asert.arbornetworks.com/uncovering-the-seven-pointed-dagger/
Information: https://github.com/m0n0ph1/malware-1/tree/master/Trochilus
Information: https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf
Malpedia: https://malpedia.caad.fkie.fraunhofer.de/details/win.trochilus_rat
Alienvault-otx: https://otx.alienvault.com/browse/pulses?q=tag:Trochilus
Last-card-change: 2020-05-14
Source: https://apt.etda.or.th/cgi-bin/listtools.cgi
TA0043 | TA0042 | TA0001 | TA0002 | TA0003 | TA0004 | TA0005 | TA0006 | TA0007 | TA0008 | TA0009 | TA0011 | TA0010 | TA0040 |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
T1053.002 SCHEDULED TASK/JOB : AT at can be used to schedule a task on a system to be executed at a specific date or time. | T1053.002 SCHEDULED TASK/JOB : AT at can be used to schedule a task on a system to be executed at a specific date or time. | T1053.002 SCHEDULED TASK/JOB : AT at can be used to schedule a task on a system to be executed at a specific date or time. |