
is a Remote Access Trojan (RAT) and information stealer first reported in mid-2020. It is often distributed as an archive (e.g., HIVERAT.rar ) or disguised as a "cracked" version of legitimate software. Type: Remote Access Trojan (RAT) / Stealer Platform: Windows (.NET based) Key Capability: Full remote control and credential theft Risk Level: High (Allows complete system compromise) 🔍 Technical Analysis 1. Delivery & Execution
May modify autorun registry keys to ensure it launches every time the computer restarts. 3. Network Activity (C2) HIVERAT.rar
If executed, prioritize changing passwords for browsers and messaging apps (Discord, etc.) from a separate, clean device. is a Remote Access Trojan (RAT) and information
Includes features for monitoring the victim's desktop and keyboard activity. Delivery & Execution May modify autorun registry keys
New, suspicious entries in the Windows folder or Registry Run keys. 🛠️ Mitigation & Safety If you have encountered this file: Do not extract or run the contents of the archive. Quarantine/Delete the file immediately. Run a Full Scan with a reputable antivirus provider.
The malware is typically delivered via phishing or malicious downloads in a compressed .rar format. Once extracted, the primary executable (often masquerading as a crack or tool) initiates the infection. 2. Core Capabilities