{"id":16269,"date":"2023-07-25T08:47:08","date_gmt":"2023-07-25T08:47:08","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=16269"},"modified":"2023-07-25T09:09:03","modified_gmt":"2023-07-25T09:09:03","slug":"pirated-software-and-hotrat","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/pirated-software-and-hotrat\/","title":{"rendered":"Trojan HotRat Is Distributed through Pirated Versions of Software and Games"},"content":{"rendered":"<p>Avast experts have warned that a new variant of AsyncRAT malware, called HotRat, is distributed through pirated versions of popular programs and utilities. This includes games, Microsoft Office, and audio and image editing software. That is not the only malware activated via an unusual spreading channel. We recently covered the <a href=\"\/blogs\/gozi-iceid-malvertising\/\"><strong>IcedID and Gozi trojans<\/a> spreading<\/strong> through malvertising. Additionally, hackers started spreading a trojanized TeamViewer installer that contains njRAT trojan.<\/p>\n<p>The original <strong>AsyncRAT<\/strong> (Remote Access Trojan) is designed to remotely monitor and control infected computers over a secure encrypted connection. Its &#8220;successor&#8221;, <strong>HotRat<\/strong>, has been active since at least October 2022, with most infections concentrated in Thailand, Guyana, Libya, Suriname, Mali, Pakistan, Cambodia, South Africa and India.<\/p>\n<div class=\"su-quote su-quote-style-default su-quote-has-cite\"><div class=\"su-quote-inner su-u-clearfix su-u-trim\">HotRat malware provides attackers with a wide range of options, including stealing credentials, cryptocurrency wallet information, screen capture, keylogging, installing additional malware, and accessing and modifying clipboard data.<span class=\"su-quote-cite\"><a href=\"https:\/\/decoded.avast.io\/martinchlumecky\/hotrat-the-risks-of-illegal-software-downloads-and-hidden-autohotkey-script-within\/\" target=\"_blank\" rel=\"nofollow noopener\">the experts write.<\/a><\/span><\/div><\/div>\n<p>HotRat spreads by combining a malicious <strong>AutoHotkey<\/strong> script with various hacked software, which is usually available on torrent trackers. The script initiates the chain of infection and is designed to deactivate antiviruses on a compromised host, as well as launch the HotRat payload using the Visual Basic script loader.<\/p>\n<figure id=\"attachment_16270\" aria-describedby=\"caption-attachment-16270\" style=\"width: 728px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/Attack-scheme.jpg\" alt=\"HotRat attack scheme\" width=\"728\" height=\"653\" class=\"size-full wp-image-16270\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/Attack-scheme.jpg 728w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/Attack-scheme-300x269.jpg 300w\" sizes=\"auto, (max-width: 728px) 100vw, 728px\" \/><figcaption id=\"caption-attachment-16270\" class=\"wp-caption-text\">Attack scheme<\/figcaption><\/figure>\n<p>Experts describe HotRat as a comprehensive RAT that supports nearly 20 commands, each of which executes a .NET module received from a remote server, which allows malware operators to extend its functionality as needed.<\/p>\n<div class=\"su-quote su-quote-style-default su-quote-has-cite\"><div class=\"su-quote-inner su-u-clearfix su-u-trim\">Despite the significant risks, the irresistible temptation to get quality software for free remains, which forces many people to download illegal software. Therefore, such software is still an effective method for the widespread distribution of malware.<span class=\"su-quote-cite\">the researchers conclude.<\/span><\/div><\/div>\n<p>The media also wrote that the <a target=\"_blank\" href=\"https:\/\/adware.guru\/new-version-of-qbot-trojan-steals-email-messages-from-its-victims\/\" rel=\"noopener nofollow\"><strong>QBot<\/strong> Trojan can steal information from emails of users of infected systems<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Avast experts have warned that a new variant of AsyncRAT malware, called HotRat, is distributed through pirated versions of popular programs and utilities. This includes games, Microsoft Office, and audio and image editing software. That is not the only malware activated via an unusual spreading channel. We recently covered the IcedID and Gozi trojans spreading [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":16277,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[24],"class_list":{"0":"post-16269","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-trojan"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/pirated-software-and-HotRat.jpg","author_info":{"display_name":"Vladimir Krasnogolovy","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/krasnogolovy\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/16269","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=16269"}],"version-history":[{"count":5,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/16269\/revisions"}],"predecessor-version":[{"id":16280,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/16269\/revisions\/16280"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/16277"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=16269"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=16269"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=16269"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}