


Define actions-upon-connect for client connections.Customize malware and control connections to infected clients.The manager/builder that the buyer now has access that allows them to: Blackremote utilizes the CodeVEST licensing system which is a third-party tool to manage software licenses and is peddled on underground forums. After the manager/builder is unpacked, a 9 MB main executable installs along with a pair of resource libraries and a resource directory with a pair of. After a user purchases the RAT, they are given a Sendspace link to download the Blackremote manager/builder software and a password to decrypt the archive that the software comes in. Speccy, as the vendor selling the RAT prefers to be called, is very cautious under each one of the RATs features, they list exactly what the feature does, without explaining how it could be used in a malicious way. Manage remote machine system startup entities.Recover passwords that were used on the system, mail clients, and browser.Download and execute any file on the system.Shutdown, reboot, and logoff system command ability.Key features that are advertised for the RAT include: The author of the RAT also posted a YouTube video with instructions on how to set the RAT up and utilize it in the best way possible. The price of the program is rather high compared to what other RATs are being sold for on criminal markets. Unit 42 has managed to find over 50 samples of the RAT and over 2,200 infections. These reasons are believed to be false because the RAT contains features that are only useful for malicious actors and have no place in a legitimate remote administration program. The website that the RAT is being advertised on is set up to look very professional and the seller has made significant efforts to promote seemingly legitimate reasons for selling the RAT.

Speccy/Rafiki: Researchers from Palo Alto’s Unit 42 have identified a threat actor that is selling a custom-built Remote Access Trojan (RAT) called BlackRemote.
