Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

GravityRAT

54
Global rank
33 infographic chevron month
Month rank
168 infographic chevron week
Week rank
0
IOCs

GravityRAT is a sophisticated spyware and remote access trojan that has been actively targeting organizations and government entities since 2016. It uses innovative anti-analysis techniques and made an evolution from a Windows-only threat to a cross-platform espionage tool capable of compromising Windows, Android, and macOS systems.

RAT
Type
Unknown
Origin
1 January, 2016
First seen
13 January, 2026
Last seen

How to analyze GravityRAT with ANY.RUN

RAT
Type
Unknown
Origin
1 January, 2016
First seen
13 January, 2026
Last seen

IOCs

Last Seen at

Recent blog posts

post image
Fix Staff Shortage & Burnout in Your SOC...
watchers 352
comments 0
post image
ANY.RUN Sandbox & MISP Integration: Confi...
watchers 2210
comments 0
post image
From Forgotten Tool to Powerful Pivot: Using...
watchers 1839
comments 0

GravityRAT: Comprehensive Defense Against the Malware That Outsmarted Sandboxes for a Decade

Key Takeaways

  1. GravityRAT is a multi-platform RAT focused on espionage, with strong ties to targeted campaigns against Indian entities.
  2. It excels at data exfiltration, including sensitive files and WhatsApp backups on Android devices.
  3. It often arrives via spear-phishing, malicious macros in documents, or trojanized apps masquerading as legitimate software.
  4. Patient social engineering through social media has proven here more effective than mass phishing campaigns.
  5. Its anti-VM checks make automated sandbox evasion a real challenge. Detection and prevention require updated EDR, behavioral monitoring, and strict app/email policies.
  6. TI Lookup accelerates IOC correlation to quickly identify GravityRAT indicators across infrastructure. Search by the RAT’s name to explore sandbox analysis sessions and gather indicators.

threatName:"gravity".

GravityRAT sandbox analyses GravityRAT sandbox analyses with IOCs and TTPs

  1. ANY.RUN’s Sandbox is capable of uncovering malicious behaviors that evade static detection and lets analyze moble as well as desktop-endpoint malware.

View analysis

GravityRAT sample in Interactive Sandbox GravityRAT malware detonated in ANY.RUN’s Sandbox

What is GravityRAT Malware?

GravityRAT is a remote access trojan designed for long-term espionage operations. The malware has undergone continuous development over nearly a decade, with operators consistently adding new capabilities while maintaining the same command-and-control infrastructure.

The threat demonstrates remarkable persistence and sophistication, utilizing digital signatures to appear legitimate, employing multiple programming languages (.NET, Python, Electron), and disguising itself as various legitimate applications including secure messaging apps, file-sharing tools, media players, and cloud storage services.

The malware's most distinctive feature is its extensive use of anti-virtual machine and anti-sandbox techniques. Researchers have identified seven different VM detection methods employed by GravityRAT, including checking BIOS versions, searching for hypervisor artifacts, counting CPU cores, and most notably, querying CPU temperature through Windows Management Instrumentation.

This temperature check is particularly effective because most hypervisors including Hyper-V, VMware Fusion, VirtualBox, KVM, and Xen do not support temperature monitoring, causing them to return error messages that immediately reveal the presence of a virtual environment.

The malware operates through a sophisticated infrastructure managed by GravityAdmin, a custom administration panel that allows operators to coordinate multiple campaigns simultaneously. Each campaign operates under specific codenames such as FOXTROT, CLOUDINFINITY, CHATICO for Android-based infections, and CRAFTWITHME, SEXYBER, and CVSCOUT for Windows-based attacks using the HeavyLift loader.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

GravityRAT Malware Victimology

GravityRAT campaigns have predominantly targeted entities within the Indian subcontinent, with a particular focus on military organizations, government agencies, defense contractors, police departments, and other sensitive institutions. The threat actor behind GravityRAT, attributed to Pakistani state-sponsored groups with tactical overlaps to Transparent Tribe (also known as APT36), has expanded its targeting beyond military and government sectors to include educational institutions and commercial enterprises.

Between 2016 and 2018, approximately 100 infections were documented among defense, police, and government employees in India. More recent campaigns from 2022 through 2024 have shown continued activity, including the attempts to compromise WhatsApp backups and target both Indian military personnel and individuals within the Pakistan Air Force. The highly targeted nature of these campaigns is evidenced by distribution methods that require specific credentials, geographic locations, or time windows to access malicious download sites.

How GravityRAT Malware Gets in and Functions

GravityRAT typically spreads through targeted spear-phishing emails containing malicious Office documents with macros or exploits for Windows infections. On Android, it disguises itself as legitimate apps, such as fake messaging platforms (e.g., BingeChat, Chatico, or SoSafe Chat), distributed via third-party sites or social engineering. It does not self-propagate laterally but relies on initial access through social engineering, with recent campaigns combining Android trojans and Windows loaders like HeavyLift.

When macros are enabled, the malicious code copies the document to a temporary directory, renames it as a ZIP archive, decompresses it to extract the executable payload, and creates a scheduled task to execute the malware while maintaining persistence.

The RAT operates through a multi-stage infection and command-and-control architecture. Upon initial execution, the malware first performs extensive environment checks to determine if it's running in a physical machine or a virtual/sandbox environment. These checks include querying the MSAcpi_ThermalZoneTemperature WMI entry for CPU temperature, examining BIOS versions for VM indicators (VMware, Xen, AMI), searching for VM hypervisor artifacts, analyzing MAC addresses for known VM prefixes, and counting CPU cores.

If the malware determines it's running on a real system, it proceeds to establish persistence through scheduled tasks and begins its data collection operations. The malware communicates with its command-and-control infrastructure via HTTP, typically using PHP endpoints with variant-specific URI paths. For example, different versions contact paths like /ROMEO/[hash].php or /TANGO/[hash].php. Initial connections often retrieve dynamic C2 addresses from hardcoded domains, allowing operators to rotate infrastructure while maintaining control.

GravityRAT implements a modular architecture where different components handle specific functions. The Android version, for instance, uses background services that periodically contact C2 servers, sending IMEI identifiers and device status while awaiting commands. The malware employs AES encryption for certain operations, with some versions using distinctive strings like "lolomycin2017" as encryption salts. File exfiltration occurs in batches, with the malware creating ZIP archives of collected documents before transmission to attacker-controlled servers.

The GravityAdmin panel provides operators with real-time visibility into infected systems, displaying lists of compromised machines organized by campaign codename and offering buttons to trigger various malicious actions against one or multiple systems simultaneously. This centralized management enables efficient coordination of large-scale espionage operations across multiple campaigns.

Sandbox Analysis of a GravityRAT Sample

ANY.RUN’s Interactive Sandbox provides isolated, instrumented environments where security researchers and analysts can safely execute suspicious files without risking production systems.

View a GravityRAT sample analysis

GravityRAT Sandbox analysis GravityRAT Android version detonated in the Interactive Sandbox

The analyzed sample is disguised as a messaging app and is typically distributed through websites that advertise a “free messenger.”

App appearance

The malicious APK presents itself as “Speak Freely,” an allegedly encrypted messaging app with the tagline:

“Say ‘Hello’ in a different messaging experience. An encrypted focus on privacy, combined with all of the features you expect.”

GravityRAT impersonating a messenger GravityRAT impersonating an Android messenger

Network information collection

GravityRAT retrieves the MCC and MNC of the SIM card operator, the SIM card’s country ISO code, the name of the current network operator, and the current network’s ISO code. This allows the malware to verify the device’s network configuration and confirm internet connectivity, which is required for further communication with the C2 server.

GravityRAT proccess tree GravityRAT’s proccess tree exposed in the Sandbox

Observed MITRE ATT&CK techniques (network discovery):

  • T1422.001 Retrieves the MCC and MNC of the SIM card operator,
  • T1422 System Network Configuration Discovery.

File and directory scanning

The malware scans files and directories, listing file names without full paths to identify potential exfiltration targets (T1420 File and Directory Discovery – Get file name without full path).

GravityRAT proccess tree GravityRAT’s proccess tree exposed in the Sandbox

Data theft

GravityRAT extracts SMS messages and call logs from protected user data, saving them in text files (e.g., /storage/emulated/0/bc/ms.log) before exfiltrating them to the C&C server.

GravityRAT creates SMS history log GravityRAT creates SMS history log

Observed MITRE ATT&CK techniques:

  • T1636.004 SMS Messages – Reads messages from SMS inbox,
  • T1636.002 Call Log – Accesses device call history logs.

The malware also targets files with extensions such as .jpg, .pdf, .txt, and WhatsApp backups.

Exfiltration and cleanup

Stolen files are sent to the attacker and then deleted from the device (in the case of logs). Communication with the C2 server uses HTTPS, providing an encrypted channel for data exfiltration and command reception.

Observed MITRE ATT&CK technique: T1521 Encrypted Channel – Establishing a connection.

It is worth emphasizing once again the importance of installing applications only from trusted sources and not from random websites—this practice significantly reduces the risk of device infection.

Gathering Threat Intelligence on GravityRAT Malware

Utilize TI Lookup to query known indicators and discover related infrastructure and samples. Conduct proactive malware hunting using YARA rules specifically developed for GravityRAT detection.

A single IOC lookup can tell whether your business sector and geographical location are actively targeted by GravityRAT campaigns:

filePath:"AppVIsvSubsystems*"

GravityRAT malicious file Search by malicious files spotted in GravityRAT campaigns

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Conclusion

GravityRAT stands out among RAT families due to its persistence, stealth, and multi-platform reach. Its targeted distribution, virtualization evasion, and ability to exfiltrate sensitive data make it a formidable threat for enterprises and high-value individuals alike. Proactive defense, threat intelligence, and robust detection tooling are key to mitigating its impact.

Trial TI Lookup to start gathering actionable threat intelligence on emerging malware: just sign up to ANY.RUN.

HAVE A LOOK AT

Latrodectus screenshot
Latrodectus
latrodectus
Latrodectus is a malicious loader that is used by threat actors to gain a foothold on compromised devices and deploy additional malware. It has been associated with the IcedID trojan and has been used by APT groups in targeted attacks. The malware can gather system information, launch executables, and detect sandbox environments. It uses encryption and obfuscation to evade detection and can establish persistence on the infected device.
Read More
Emmenhtal screenshot
Emmenhtal
emmenhtal
First identified in 2024, Emmenhtal operates by embedding itself within modified legitimate Windows binaries, often using HTA (HTML Application) files to execute malicious scripts. It has been linked to the distribution of malware such as CryptBot and Lumma Stealer. Emmenhtal is typically disseminated through phishing campaigns, including fake video downloads and deceptive email attachments.
Read More
DarkCloud screenshot
DarkCloud
darkcloud
DarkCloud is an infostealer that focuses on collecting and exfiltrating browser data from the infected device. The malware is also capable of keylogging and crypto address swapping. DarkCloud is typically delivered to victims’ computers via phishing emails.
Read More
Zloader screenshot
Zloader
zloader trojan loader
Zloader is a banking trojan that uses webinjects and VNC clients to still banking credentials. This Trojan is based on leaked code from 2011, but despite its age, Zloader’s popularity has been only increasing through early 2020, when it relied on COVID-19 themed attacks.
Read More
Gh0st RAT screenshot
Gh0st RAT
gh0st
Gh0st RAT is a malware with advanced trojan functionality that enables attackers to establish full control over the victim’s system. The spying capabilities of Gh0st RAT made it a go-to tool for numerous criminal groups in high-profile attacks against government and corporate organizations. The most common vector of attack involving this malware begins with spam and phishing emails.
Read More
Xeno RAT screenshot
Xeno RAT
xenorat
Xeno RAT is an open-source malware mainly distributed through drive-by downloads. The core capabilities of this threat include remote control, keystroke logging, webcam and microphone access. Equipped with advanced utilities, such as Hidden Virtual Network Computing and Socks5 reverse proxy, Xeno RAT is most frequently used in attacks against individual users.
Read More