Regions Targeted: Not specified
Related Families: None identified
Key Takeaways
What is Chaos RAT?
Chaos RAT spreads primarily via phishing emails containing malicious PDF attachments. These PDFs exploit user interaction by prompting victims to click embedded links, which initiate the download of malicious payloads. On Windows systems, the infection begins with a JavaScript file that fetches a ZIP archive containing a BAT script. This script executes a series of commands to download and run the final Chaos RAT payload, establishing persistence through scheduled tasks and registry modifications. On Linux, the malware masquerades as a legitimate network diagnostic tool, such as "NetworkCheck," to deceive users. It employs shell scripts to retrieve and execute the RAT, often using obfuscated URLs and encrypted payloads to bypass security controls.
The technical sophistication of Chaos RAT is evident in its multi-stage delivery and anti-analysis techniques. The malware uses complex obfuscation, including encoded strings and dynamic API resolution, to hinder reverse engineering. It also implements checks to detect virtualized environments and sandboxes, ensuring it only executes in favorable conditions. Once deployed, Chaos RAT grants attackers extensive control over infected systems. Capabilities include keylogging, screen capture, file exfiltration, and remote command execution. Additionally, it deploys cryptocurrency mining modules, leveraging system resources to generate illicit profits while degrading performance.
While targeted verticals or geographic regions were not specified, the dual-platform targeting of Windows and Linux suggests a broad attack surface, potentially affecting diverse industries. Its open-source origins have facilitated rapid iteration by threat actors, who have enhanced its feature set and evasion tactics since its inception. PolySwarm analysts consider Chaos RAT to be an evolving threat.
IOCs
PolySwarm has multiple samples of Chaos RAT.
1e074d9dca6ef0edd24afb2d13ca4429def5fc5486cd4170c989ef60efd0bbb0
77962a384d251f0aa8e3008a88f206d6cb1f7401c759c4614e3bfe865e3e985c
44c54d9d0b8d4862ad7424c677a6645edb711a6d0f36d6e87d7bae7a2cb14d68
c9694483c9fc15b2649359dfbd8322f0f6dd7a0a7da75499e03dbc4de2b23cad
080f56cea7acfd9c20fc931e53ea1225eb6b00cf2f05a76943e6cf0770504c64
a583bdf46f901364ed8e60f6aadd2b31be12a27ffccecc962872bc73a9ffd46c
a364ec51aa9314f831bc498ddaf82738766ca83b51401f77dbd857ba4e32a53b
a6307aad70195369e7ca5575f1ab81c2fd82de2fe561179e38933f9da28c4850
c39184aeb42616d7bf6daaddb9792549eb354076b4559e5d85392ade2e41763e
719082b1e5c0d18cc0283e537215b53a864857ac936a0c7d3ddbaf7c7944cf79
You can use the following CLI command to search for all Chaos RAT samples in our portal:
$ polyswarm link list -f ChaosRAT
Don’t have a PolySwarm account? Go here to sign up for a free Community plan or subscribe.
Contact us at hivemind@polyswarm.io | Check out our blog | Subscribe to our reports.