I can provide more specific details if you have a of your specific sample or if you'd like to see a list of common file paths it uses for persistence. Would you like a list of detection rules (like Sigma or Yara) for this threat? New Families and Detection Updates - Hatching Triage
May modify autorun registry keys to ensure it launches every time the computer restarts. 3. Network Activity (C2) HIVERAT.rar
is a Remote Access Trojan (RAT) and information stealer first reported in mid-2020. It is often distributed as an archive (e.g., HIVERAT.rar ) or disguised as a "cracked" version of legitimate software. Type: Remote Access Trojan (RAT) / Stealer Platform: Windows (.NET based) Key Capability: Full remote control and credential theft Risk Level: High (Allows complete system compromise) 🔍 Technical Analysis 1. Delivery & Execution I can provide more specific details if you
Includes features for monitoring the victim's desktop and keyboard activity. Type: Remote Access Trojan (RAT) / Stealer Platform:
This write-up provides an overview and technical breakdown of the malware associated with the file , which typically contains a variant of the HiveRAT remote access trojan. 🛡️ Malware Overview