GroDDViewer: AndroRAT

Sample name: androRAT

Malware Family

android remote access tools

Sample description:

The application connect to the server C&C and wait the different order or remote command.

File details:

  • MD5 : 639765980d711489b79d137e7253a630
  • SHA256 : 8283557cc74ff16b045d6fd2f9877a24879051ded4b169219029fa9ff63595c6
  • Size : 66.3 KB
View mode
System Flow Graph
Type: Group: Socket: .dex: .tmp: .apk: .db-mj0600A586: .dex: .tmp: .apk: .db-mj0600A586:
Grid Layout
Nb processes:

  • Graph legend
  • process
  • file
  • socket
Interactions frequency and zoom on time intervals
Min: 0 | Max: 1000 |
Current: 0
Speed: 500