{
	"id": "1ecc1e64-b8b6-406e-b1de-6577baf8fa77",
	"created_at": "2026-04-06T00:13:43.435513Z",
	"updated_at": "2026-04-10T03:21:35.783724Z",
	"deleted_at": null,
	"sha1_hash": "d350a668c15e48198f147bc3221b589920dae12e",
	"title": "GitHub - NYAN-x-CAT/Lime-RAT: LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 331123,
	"plain_text": "GitHub - NYAN-x-CAT/Lime-RAT: LimeRAT | Simple, yet\r\npowerful remote administration tool for Windows (RAT)\r\nBy Nyrotication\r\nArchived: 2026-04-05 16:06:04 UTC\r\nOutdated. Archive it instead of delete it\r\nLimeRAT v0.1.9\r\nRemote Administration Tool For Windows\r\nDescription\r\nSimple yet powerful RAT for Windows machines. This project is simple and easy to understand, It should give\r\nyou a general knowledge about dotNET malwares and how it behaves.\r\nMain Features\r\n.NET\r\nCoded in Visual Basic .NET, Client required framework 2.0 or 4.0 dependency, And server is 4.0\r\nhttps://github.com/NYAN-x-CAT/Lime-RAT\r\nPage 1 of 7\n\nConnection\r\nUsing pastebin.com as ip:port , Instead of noip.com DNS. And Also using multi-ports\r\nPlugin\r\nUsing plugin system to decrease stub's size and lower the AV detection\r\nEncryption\r\nThe communication between server \u0026 client is encrypted with AES\r\nSpreading\r\nInfecting all files and folders on USB drivers\r\nBypass\r\nLow AV detection and undetected startup method\r\nLightweight\r\nPayload size is about 25 KB\r\nAnti Virtual Machines\r\nUninstall itself if the machine is virtual to avoid scanning or analyzing\r\nRansomware\r\nEncrypting files on all HHD and USB with .Lime extension\r\nXMR Miner\r\nHigh performance Monero CPU miner with user idle\\active optimizations\r\nDDoS\r\nCreating a powerful DDOS attack to make an online service unavailable\r\nCrypto Stealer\r\nStealing Cryptocurrency sensitive data\r\nScreen-Locker\r\nPrevents user from accessing their Windows GUI\r\nAnd more\r\nOn Connect Auto Task\r\nForce enable Windows RDP\r\nPersistence\r\nFile manager\r\nPassowrds stealer\r\nRemote desktop\r\nBitcoin grabber\r\nDownloader\r\nKeylogger\r\nPrerequisites\r\nTo open project you need:\r\n1. Visual Studio 2017\r\n2. This repository\r\nhttps://github.com/NYAN-x-CAT/Lime-RAT\r\nPage 2 of 7\n\nPeek\r\nProject\r\nRansomware\r\nhttps://github.com/NYAN-x-CAT/Lime-RAT\r\nPage 3 of 7\n\nCritical Process\r\nhttps://github.com/NYAN-x-CAT/Lime-RAT\r\nPage 4 of 7\n\nPlugin Example\r\nVB.NET\r\n'Easy to create a DLL plugin\r\nPublic Class Main\r\n'Simple Msgbox\r\n Public Shared Sub CN(ByVal H As String, ByVal P As Integer, ByVal K As String, ByVal SP As String, B\r\n Msgbox(\"Hello Client!\")\r\n Send(\"MSG\" + SPL + \"Hello Server!\")\r\n 'Client will send msg back to server, MSG will be showen in [LOG] Tab\r\n End Sub\r\nEnd Class\r\nC#\r\nhttps://github.com/NYAN-x-CAT/Lime-RAT\r\nPage 5 of 7\n\npublic class Main\r\n{\r\n // Simple Msgbox\r\n public static void CN(string H, int P, string K, string SP, string PW, string FP, string HW, stri\r\n {\r\n Msgbox(\"Hello Client!\");\r\n Send(\"MSG\" + SPL + \"Hello Server!\");\r\n// Client will send msg back to server, MSG will be showen in [LOG] Tab\r\n }\r\n}\r\nTesting\r\n1. Open \"LimeRAT.sln\"\r\n2. Set Compiler to \"Debug\" mode\r\n3. On Solution Explorer, Right click on \"Solution LimeRAT Project\" and press \"Rebuild Solution\"\r\n4. Press Run button. be aware that both client and server are localhost\r\nCompiling\r\n1. Open \"LimeRAT.sln\"\r\n2. Set Compiler to \"Release\" mode\r\n3. On Solution Explorer, Right click on \"Solution LimeRAT Project\" and press \"Rebuild Solution\"\r\n4. Everything will be under \"\\Project_EXE\\Release\"\r\n5. Convert stub.exe to stub.il, using Ildasm\r\nDownload SRC and compiled version\r\nhttps://github.com/NYAN-x-CAT/Lime-RAT/releases\r\nThis project was only tested on local-lab[LAN]. I did not test it on external-lab[WAN].\r\nServer tested on Windows 10, Client tested on virtual machine windows 7.\r\nNotes\r\n1. While using ransomware, restore point won't be deleted unless payload is running hight privilege\r\n2. Anti-Kill (BSOD) won't work unless payload is running hight privilege\r\nFound a bug? Please, report it here https://github.com/NYAN-x-CAT/Lime-RAT/issues/new\r\nhttps://github.com/NYAN-x-CAT/Lime-RAT\r\nPage 6 of 7\n\nAuthor\r\nNYAN CAT\r\nDonation\r\nBuy me a coffee!\r\nXMR:\r\n49H8Kbf15JFN2diG5evGHA5G49qhgFBuDid86z3MKxTv59dcqySCzFWUL3SgsEk2SufzTziHp3UE5P8BatwuyFuv1bBKQw2\r\nBTC: 12hTx7u7AqdNr8qo4UFuLwb6XAVjoDioax\r\nSupport\r\nGithub: https://github.com/NYAN-x-CAT/Lime-RAT/issues/new\r\nEmail: NYANxCAT@pm.me\r\nDisclaimer\r\nI, the creator, am not responsible for any actions, and or damages, caused by this software.\r\nYou bear the full responsibility of your actions and acknowledge that this software was created for educational\r\npurposes only.\r\nThis software's main purpose is NOT to be used maliciously, or on any system that you do not own, or have the\r\nright to use.\r\nBy using this software, you automatically agree to the above.\r\nLicense\r\nlicense m i t\r\nThis project is licensed under the MIT License - see the LICENSE file for details\r\nSource: https://github.com/NYAN-x-CAT/Lime-RAT\r\nhttps://github.com/NYAN-x-CAT/Lime-RAT\r\nPage 7 of 7",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://github.com/NYAN-x-CAT/Lime-RAT"
	],
	"report_names": [
		"Lime-RAT"
	],
	"threat_actors": [],
	"ts_created_at": 1775434423,
	"ts_updated_at": 1775791295,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/d350a668c15e48198f147bc3221b589920dae12e.pdf",
		"text": "https://archive.orkl.eu/d350a668c15e48198f147bc3221b589920dae12e.txt",
		"img": "https://archive.orkl.eu/d350a668c15e48198f147bc3221b589920dae12e.jpg"
	}
}