Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

GravityRAT

54
Global rank
18 infographic chevron month
Month rank
63 infographic chevron week
Week rank
0
IOCs

GravityRAT is a sophisticated spyware and remote access trojan that has been actively targeting organizations and government entities since 2016. It uses innovative anti-analysis techniques and made an evolution from a Windows-only threat to a cross-platform espionage tool capable of compromising Windows, Android, and macOS systems.

RAT
Type
Unknown
Origin
1 January, 2016
First seen
6 January, 2026
Last seen

How to analyze GravityRAT with ANY.RUN

RAT
Type
Unknown
Origin
1 January, 2016
First seen
6 January, 2026
Last seen

IOCs

Last Seen at

Recent blog posts

post image
Integrating a Malware Sandbox into SOAR Workf...
watchers 514
comments 0
post image
5 Ways MSSPs Can Win Clients in 2026
watchers 448
comments 0
post image
Release Notes: AI Sigma Rules, Live Threat La...
watchers 519
comments 0

GravityRAT: Comprehensive Defense Against the Malware That Outsmarted Sandboxes for a Decade

Key Takeaways

  1. GravityRAT is a multi-platform RAT focused on espionage, with strong ties to targeted campaigns against Indian entities.
  2. It excels at data exfiltration, including sensitive files and WhatsApp backups on Android devices.
  3. It often arrives via spear-phishing, malicious macros in documents, or trojanized apps masquerading as legitimate software.
  4. Patient social engineering through social media has proven here more effective than mass phishing campaigns.
  5. Its anti-VM checks make automated sandbox evasion a real challenge. Detection and prevention require updated EDR, behavioral monitoring, and strict app/email policies.
  6. TI Lookup accelerates IOC correlation to quickly identify GravityRAT indicators across infrastructure. Search by the RAT’s name to explore sandbox analysis sessions and gather indicators.

threatName:"gravity".

GravityRAT sandbox analyses GravityRAT sandbox analyses with IOCs and TTPs

  1. ANY.RUN’s Sandbox is capable of uncovering malicious behaviors that evade static detection and lets analyze moble as well as desktop-endpoint malware.

View analysis

GravityRAT sample in Interactive Sandbox GravityRAT malware detonated in ANY.RUN’s Sandbox

What is GravityRAT Malware?

GravityRAT is a remote access trojan designed for long-term espionage operations. The malware has undergone continuous development over nearly a decade, with operators consistently adding new capabilities while maintaining the same command-and-control infrastructure.

The threat demonstrates remarkable persistence and sophistication, utilizing digital signatures to appear legitimate, employing multiple programming languages (.NET, Python, Electron), and disguising itself as various legitimate applications including secure messaging apps, file-sharing tools, media players, and cloud storage services.

The malware's most distinctive feature is its extensive use of anti-virtual machine and anti-sandbox techniques. Researchers have identified seven different VM detection methods employed by GravityRAT, including checking BIOS versions, searching for hypervisor artifacts, counting CPU cores, and most notably, querying CPU temperature through Windows Management Instrumentation.

This temperature check is particularly effective because most hypervisors including Hyper-V, VMware Fusion, VirtualBox, KVM, and Xen do not support temperature monitoring, causing them to return error messages that immediately reveal the presence of a virtual environment.

The malware operates through a sophisticated infrastructure managed by GravityAdmin, a custom administration panel that allows operators to coordinate multiple campaigns simultaneously. Each campaign operates under specific codenames such as FOXTROT, CLOUDINFINITY, CHATICO for Android-based infections, and CRAFTWITHME, SEXYBER, and CVSCOUT for Windows-based attacks using the HeavyLift loader.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

GravityRAT Malware Victimology

GravityRAT campaigns have predominantly targeted entities within the Indian subcontinent, with a particular focus on military organizations, government agencies, defense contractors, police departments, and other sensitive institutions. The threat actor behind GravityRAT, attributed to Pakistani state-sponsored groups with tactical overlaps to Transparent Tribe (also known as APT36), has expanded its targeting beyond military and government sectors to include educational institutions and commercial enterprises.

Between 2016 and 2018, approximately 100 infections were documented among defense, police, and government employees in India. More recent campaigns from 2022 through 2024 have shown continued activity, including the attempts to compromise WhatsApp backups and target both Indian military personnel and individuals within the Pakistan Air Force. The highly targeted nature of these campaigns is evidenced by distribution methods that require specific credentials, geographic locations, or time windows to access malicious download sites.

How GravityRAT Malware Gets in and Functions

GravityRAT typically spreads through targeted spear-phishing emails containing malicious Office documents with macros or exploits for Windows infections. On Android, it disguises itself as legitimate apps, such as fake messaging platforms (e.g., BingeChat, Chatico, or SoSafe Chat), distributed via third-party sites or social engineering. It does not self-propagate laterally but relies on initial access through social engineering, with recent campaigns combining Android trojans and Windows loaders like HeavyLift.

When macros are enabled, the malicious code copies the document to a temporary directory, renames it as a ZIP archive, decompresses it to extract the executable payload, and creates a scheduled task to execute the malware while maintaining persistence.

The RAT operates through a multi-stage infection and command-and-control architecture. Upon initial execution, the malware first performs extensive environment checks to determine if it's running in a physical machine or a virtual/sandbox environment. These checks include querying the MSAcpi_ThermalZoneTemperature WMI entry for CPU temperature, examining BIOS versions for VM indicators (VMware, Xen, AMI), searching for VM hypervisor artifacts, analyzing MAC addresses for known VM prefixes, and counting CPU cores.

If the malware determines it's running on a real system, it proceeds to establish persistence through scheduled tasks and begins its data collection operations. The malware communicates with its command-and-control infrastructure via HTTP, typically using PHP endpoints with variant-specific URI paths. For example, different versions contact paths like /ROMEO/[hash].php or /TANGO/[hash].php. Initial connections often retrieve dynamic C2 addresses from hardcoded domains, allowing operators to rotate infrastructure while maintaining control.

GravityRAT implements a modular architecture where different components handle specific functions. The Android version, for instance, uses background services that periodically contact C2 servers, sending IMEI identifiers and device status while awaiting commands. The malware employs AES encryption for certain operations, with some versions using distinctive strings like "lolomycin2017" as encryption salts. File exfiltration occurs in batches, with the malware creating ZIP archives of collected documents before transmission to attacker-controlled servers.

The GravityAdmin panel provides operators with real-time visibility into infected systems, displaying lists of compromised machines organized by campaign codename and offering buttons to trigger various malicious actions against one or multiple systems simultaneously. This centralized management enables efficient coordination of large-scale espionage operations across multiple campaigns.

Sandbox Analysis of a GravityRAT Sample

ANY.RUN’s Interactive Sandbox provides isolated, instrumented environments where security researchers and analysts can safely execute suspicious files without risking production systems.

View a GravityRAT sample analysis

GravityRAT Sandbox analysis GravityRAT Android version detonated in the Interactive Sandbox

The analyzed sample is disguised as a messaging app and is typically distributed through websites that advertise a “free messenger.”

App appearance

The malicious APK presents itself as “Speak Freely,” an allegedly encrypted messaging app with the tagline:

“Say ‘Hello’ in a different messaging experience. An encrypted focus on privacy, combined with all of the features you expect.”

GravityRAT impersonating a messenger GravityRAT impersonating an Android messenger

Network information collection

GravityRAT retrieves the MCC and MNC of the SIM card operator, the SIM card’s country ISO code, the name of the current network operator, and the current network’s ISO code. This allows the malware to verify the device’s network configuration and confirm internet connectivity, which is required for further communication with the C2 server.

GravityRAT proccess tree GravityRAT’s proccess tree exposed in the Sandbox

Observed MITRE ATT&CK techniques (network discovery):

  • T1422.001 Retrieves the MCC and MNC of the SIM card operator,
  • T1422 System Network Configuration Discovery.

File and directory scanning

The malware scans files and directories, listing file names without full paths to identify potential exfiltration targets (T1420 File and Directory Discovery – Get file name without full path).

GravityRAT proccess tree GravityRAT’s proccess tree exposed in the Sandbox

Data theft

GravityRAT extracts SMS messages and call logs from protected user data, saving them in text files (e.g., /storage/emulated/0/bc/ms.log) before exfiltrating them to the C&C server.

GravityRAT creates SMS history log GravityRAT creates SMS history log

Observed MITRE ATT&CK techniques:

  • T1636.004 SMS Messages – Reads messages from SMS inbox,
  • T1636.002 Call Log – Accesses device call history logs.

The malware also targets files with extensions such as .jpg, .pdf, .txt, and WhatsApp backups.

Exfiltration and cleanup

Stolen files are sent to the attacker and then deleted from the device (in the case of logs). Communication with the C2 server uses HTTPS, providing an encrypted channel for data exfiltration and command reception.

Observed MITRE ATT&CK technique: T1521 Encrypted Channel – Establishing a connection.

It is worth emphasizing once again the importance of installing applications only from trusted sources and not from random websites—this practice significantly reduces the risk of device infection.

Gathering Threat Intelligence on GravityRAT Malware

Utilize TI Lookup to query known indicators and discover related infrastructure and samples. Conduct proactive malware hunting using YARA rules specifically developed for GravityRAT detection.

A single IOC lookup can tell whether your business sector and geographical location are actively targeted by GravityRAT campaigns:

filePath:"AppVIsvSubsystems*"

GravityRAT malicious file Search by malicious files spotted in GravityRAT campaigns

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Conclusion

GravityRAT stands out among RAT families due to its persistence, stealth, and multi-platform reach. Its targeted distribution, virtualization evasion, and ability to exfiltrate sensitive data make it a formidable threat for enterprises and high-value individuals alike. Proactive defense, threat intelligence, and robust detection tooling are key to mitigating its impact.

Trial TI Lookup to start gathering actionable threat intelligence on emerging malware: just sign up to ANY.RUN.

HAVE A LOOK AT

Phorpiex screenshot
Phorpiex
phorpiex
Phorpiex is a malicious software that has been a significant threat in the cybersecurity landscape since 2016. It is a modular malware known for its ability to maintain an extensive botnet. Unlike other botnets, Phorpiex does not concentrate on DDoS attacks. Instead, it has been involved in numerous large-scale spam email campaigns and the distribution of other malicious payloads, such as LockBit.
Read More
Cactus Ransomware screenshot
Cactus ransomware-as-a-service (RaaS) was first caught in March 2023 targeting corporate networks. It became known for its self-encrypting payload and double extortion tactics. Cactus primarily targets large enterprises across industries in finance, manufacturing, IT, and healthcare. It is known for using custom encryption techniques, remote access tools, and penetration testing frameworks to maximize damage.
Read More
DarkGate screenshot
DarkGate
darkgate
DarkGate is a loader, which possesses extensive functionality, ranging from keylogging to crypto mining. Written in Delphi, this malware is known for the use of AutoIT scripts in its infection process. Thanks to this malicious software’s versatile architecture, it is widely used by established threat actors.
Read More
Cobalt Strike screenshot
Cobalt Strike
cobaltstrike
Cobalt Strike is a legitimate penetration software toolkit developed by Forta. But its cracked versions are widely adopted by bad actors, who use it as a C2 system of choice for targeted attacks.
Read More
Havoc screenshot
Havoc
havoc
Havoc is an advanced post-exploitation framework used by hackers to take control of a system once they've breached it. With Havoc, attackers can run commands remotely, inject malicious processes, and access sensitive data. It's often used in targeted attacks, allowing cybercriminals to stay hidden in a network while stealing information or launching further attacks. Its flexibility and ability to bypass detection make it a serious threat, especially in environments that rely on traditional security tools.
Read More
INC Ransomware screenshot
INC Ransomware is a ransomware-as-a-service (RaaS) spotted in mid-2023. It targets industries like retail, real estate, finance, healthcare, and education, primarily in the U.S. and UK. It encrypts and exfiltrates data demanding a ransom. It employs advanced evasion techniques, destroys backup, and abuses legitimate system tools at all the stages of the kill chain.
Read More