Saturday, 18 January 2014

ANDRORAT

ANDRORAT stands for ANDROid Remote Accessing Tool . Androrat was the project of four university students from France. According to their README, it was completed in one month. It has since been removed from the Github account on which it was hosted, and for privacy reasons these students will not be named here. It was designed to get access and share data b/w 2 android mobiles . This is a type of trojan which is based on android os .
Sample screenshot of the actual advertisement:

Functionality

Androrat covers the breadth of Android malware features. From the README:

    ### All the available functionalities are
    * Get contacts (and all theirs informations) 
    * Get call logs 
    * Get all messages 
    * Location by GPS/Network 
    * Monitoring received messages in live 
    * Monitoring phone state in live (call received, call sent, call missed..) 
    * Take a picture from the camera 
    * Stream sound from microphone (or other sources..) 
    * Streaming video (for activity based client only) 
    * Do a toast 
    * Send a text message 
    * Give call 
    * Open an URL in the default browser 
    * Do vibrate the phone

**this software has been removed from github but you can download ANDRORAT here


Conclusion

Since the source code was public, this project provides a significant starting point for new Android malware authors. However, it does not contain any root exploits, it does not attempt to obfuscate the code or communication, and it has not been refined to a point that I would call reliable.


No comments:

Post a Comment