top of page

Analyzing A Reverse Shell

  • Hacking By Doing
  • Dec 7, 2022
  • 1 min read

In this post, I am going to analyze another RAT downloaded from the HuskyHacks GitHub page.

ree



This is the information I have on the file before analyzing.

ree

I have a message from the IR team telling me they found another sample that looks similar to the last one, and there is also a txt file with hashes.


I extracted strings using FLOSS but didn't find anything valuable.

ree


After looking again with PEstudio it looks like there might be a socket capability.

ree

Moving on to dynamic analysis.


Initial Detonation.


ree










A record DNS: aaa...kadusus.local


ree

ree

Adding the address to the hosts file

ree

Potential call out to specified DNS record on HTTPS port (443)


ree

Reverse shell capabilities

ree

Conclusion:


Seems like the file has reverse shell capabilities and I managed to run some commands to verify my conclusions.


Thank you for reading and I hope you found this post interesting.



bottom of page