A sophisticated Android remote access trojan (RAT) has been discovered on GitHub, named "Android-RAT," created by the user Huckel789. This malware is fully undetectable (FUD) and can bypass modern security measures and antivirus systems. It operates through a web-based interface without requiring installation on a PC, making it accessible to users with varying technical skills. The RAT exploits GitHub's trusted platform status to evade security filters and includes features such as keylogging, credential hijacking, ransomware functionality, and social engineering tools.
The malware employs advanced stealth techniques to avoid detection by antivirus solutions and VirusTotal scans, integrating anti-emulator and virtual machine detection mechanisms. It can persist through battery optimization modes and power management restrictions, particularly in Chinese ROMs like MIUI, while consuming minimal system resources.
The RAT's communication infrastructure uses AES-128-CBC encryption for secure data transmissions, complicating network traffic analysis. Its "Freeze Mode" limits data transmission to 1-3MB over 24 hours, reducing the likelihood of detection. Additionally, the malware can inject its payload into legitimate applications via a dropper module, making initial infection vectors difficult to identify.