GravityRAT aim to go cross platform. It is available for Windows OS, macOS, and Android. The reported distribution methods are malicious applications, infected email attachments, malicious online activities, social engineering, and software cracks. Once its executed on the system , its searches for files in the device memory and on connected media with the extensions .jpg, .jpeg, .log, .png, .txt, .pdf, .xml, .doc, .xls, .xlsx, .ppt, .pptx, .docx, and .opus, and sends these to its command and control servers.