
SonicWall Capture Labs Threats Research team observed an Android Remote Administration Tool (RAT) named Ahmyth which is being trojanized into other Android apps and is getting distributed in the wild. Upon infecting an Android device this RAT can send sensitive information present on the device like SMS and call logs as well as perform functions like taking a picture, sending a text message or record audio via the microphone.
After obtaining a couple of malicious RAT samples we investigated further revealing the origins of this RAT. We found a Github repository that hosts the code for this RAT - https://github.com/AhMyth.
This RAT was released in 2017 and supports multiple Operating Systems:
The author claims that this was developed for educational purposes (as highlighted on Github) but clearly someone is spreading this RAT for their own malicious motives, more on that later.
Inside Ahmyth
This RAT contains two components:
Upon installing and running the server component we see the opening screen which shows a list of victims, currently in the image below there are none since we haven't infected any victims yet.
In-order to report back to the server we add the server's IP address in the source, once done we can build an apk which will report back to our machine:

Now the apk is ready to infect a device and report back to the server. Upon installing on a device the apk reports back to the server and we can see the victim's entry on the dashboard:

The attacker can now command the RAT to perform a number of functions, few of them are highlighted below:






We obtained samples with different source location, this is the address where the apk will report back to:
Spreading Ahmyth further
Malicious apk's spread mainly via the following two routes:
Additionally an attacker can spread this RAT via the Ahmyth control server by:
Another way to spread is this RAT is to trojanize it into something benign. Malware writers have already started combining Ahmyth with other clean Android apk's, we identified a few of them:
Below is a comparison of the code structure found in the original Ahmyth client apk and a few trojanized samples in the wild:

Overall this looks like another case where a publicly available tool has been used for personal reasons with a malicious intent. We can expect more trojanized Android samples with a hidden Ahmyth RAT in the near future.
Sonicwall Capture Labs provides protection against this threat with the following signatures:
Basic details about the samples analyzed:
Share This Article

An Article By
An Article By
Security News
Security News