Jump to content

Is there something like a "Revenge-Rat"


contrix_

Recommended Posts

So this is basically an update to my post here: 

 

I didn't know how the person got my RAT in the first place and how they got onto my computer. Now I know that it wasn't someone that got into my Computer because of the cracked version of the Rat-Program - even though there was a silent monero miner in it - but it was someone that got my file from VirusTotal. It's a site where you can scan files and see which out of like 50 antiviruses detect it. I didn't know that they distribute the files and that you can straightly DOWNLOAD them from the site. So someone was probably running a bot on a Virtual Machine, that downloads all files that get flagged as a rat by the antivirus programs on VirusTotal and download them. I remember that I once saw a video on YouTube where someone was able to get into the machine of someone that tried to RAT him by using the file of that person.

 

So is there a way that someone used my file to get into my computer? What are they able to do with it?

 

Thanks for any answers ;)

 

PS: From now on, if I have to use a online virus scanner, I'm using nodistribute ^^

Link to comment
Share on other sites

The RAT would need to have remote access details directly to your computer which would have to have some kind of willing security breach. In that case, why would you upload it online if it could remotely access your computer with the click of a button?

And why not make a VM with a virus scanner on it and do some offline scanning, instead?

Link to comment
Share on other sites

 

6 minutes ago, Dave-ee Jones said:

The RAT would need to have remote access details directly to your computer which would have to have some kind of willing security breach. In that case, why would you upload it online if it could remotely access your computer with the click of a button?

And why not make a VM with a virus scanner on it and do some offline scanning, instead?

I uploaded the file which would have granted me access if someone executed it.

 

I also considered doing it with a VM, but I would have to download all these virus scanners, which is the advantage oft online scanners.

Link to comment
Share on other sites

4 hours ago, contrix_ said:

I also considered doing it with a VM, but I would have to download all these virus scanners, which is the advantage oft online scanners.

But the disadvantage is that the online scanners probably monitor all the files to check for anything illegal or overly dangerous, and upload each file for others to download if they wish. You also never know if they're legit or not, as some just try to make you buy stuff.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...