

Multiple Dell Products Vulnerabilities
June 15, 2024
Gh0st RAT – Active IOCs
June 16, 2024
Multiple Dell Products Vulnerabilities
June 15, 2024
Gh0st RAT – Active IOCs
June 16, 2024Severity
High
Analysis Summary
Noodle RAT, a previously undocumented cross-platform malware, has been identified as a distinct and new threat used by Chinese-speaking threat actors for espionage and cybercrime since at least July 2016.
Initially classified as a variant of Gh0st RAT and Rekoobe, researchers clarified that Noodle RAT is an entirely new type of backdoor. Known by monikers such as ANGRYREBEL and Nood RAT, it is available in both Windows and Linux versions utilized by groups like Iron Tiger, Calypso, Rocke, and Cloud Snooper. This malware has been active in various campaigns leveraging shellcode foundations and loaders like MULTIDROP and MICROLOAD particularly targeting regions such as Thailand and India.

The Windows version of Noodle RAT is an in-memory modular backdoor that supports a wide range of malicious activities including downloading/uploading files running additional malware acting as a TCP proxy, and self-deletion. Conversely, the Linux version is adept at launching reverse shells scheduling executions, and initiating SOCKS tunneling. It exploits known security vulnerabilities in public-facing applications to breach servers and deploy web shells. Despite differences in backdoor commands both versions share identical code for command-and-control (C2) communications and configuration formats reflecting a high level of sophistication and similarity in their underlying architecture.
Further analysis revealed that while Noodle RAT reuses plugins from Gh0st RAT and shares some code with Rekoobe, it remains a unique backdoor. The investigation uncovered a control panel and builder for the Linux variant with release notes in Simplified Chinese indicating ongoing development and maintenance.
This points to a commercial aspect where Noodle RAT is likely sold and distributed among interested parties within the Chinese-speaking cybercrime ecosystem. The leaks have further exposed a corporate hack-for-hire scene in China highlighting connections between private firms and state-sponsored cyber actors.
The discovery of Noodle RAT underscores the complexity and commercial nature of China's cyber espionage operations. Tools like Noodle RAT are believed to be part of a sophisticated supply chain involving private and government entities engaged in malicious activities. Findings emphasize that Noodle RAT has been misclassified and underrated for years revealing its significant role in the arsenal of Chinese cyber threat actors and its widespread distribution among various groups for espionage and cybercrime purposes.
Impact
- Sensitive Data Theft
- Data Exfiltration
- Unauthorized Access
Indicators of Compromise
MD5
- 4f5297c564c8f0064e7db65864198025
- 025a32835eb8647147ed1bbf64c37fa5
- 6728b74d5b30d2db8436f0c9f64684f1
- cb131b05dc3e42fad5caeadccbee378b
- ecac141c99e8cef83389203b862b24fd
- 67c8235ac0861c8622ac2ddb1f5c4a18
- c1eebf2d4f441226770276110d1e5cf2
- 0a35e06f53c17ab1c8e18e7e0c0821d8
- b42018c5fba4758ac46eb2c39344a020
- f9eece34b6574236f067fa1a1782cdc0
- 7d631e5b0c78805dd5d440cce788d25b
- 35743db3dc333245ef5b69100721ced9
SHA-256
- cf543c6d4fb03ebc0a00a8ebe89511af713817878351a2bccfc62a1cc4ac0b3f
- cde4ca499282045eecd4fc15ac80a232294556a59b3c8c8a7a593e8333cfd3c7
- 479e3ef28d3c70b110ff993086e4518f4a5a6fb8285b530350ad2bcd6d0bb192
- 53338d643052bb2082f1370c21a21ff41ee1e6f43b3bd937519d7c9a491aeb13
- c49371cd8dd33f725a780ea179e6281f5cb7f42e84a00836c8fe3350b7b9b2d0
- a8db92a8f34caa5084a3fdb8a683a1854bff84612dfd25a965bc12a454a38556
- 678edc2ea9473b02a13e9fc7557f6c7172f0f00f4237e2da91a6766c53db1d3d
- 275d63587f3ac511d7cca5ff85af2914e74d8b68edd5a7a8a1609426d5b7f6a9
- 5cda94180b245de8421f226eb516d0aa1d3fd8167ebed4fa06070dd38344cec0
- 61f34459815eb403ec841246a4277d825dcd25700baad867b61ec3166d034825
- 67e60fca3d28dcae09b74ffd62f5efe462700b6d2b3334d519e4caac55820df0
- 3bff2c5bfc24fc99d925126ec6beb95d395a85bc736a395aaf4719c301cbbfd4
SHA1
- 8d9530b52744e681b1ca0de5580d065083cf9e44
- b3a027f3bdb8ce87ea5eacc65e803d89b5f3dc35
- 6920cf39875fb1be1a01471c3041ece615ee4e4e
- 8965d8da52af8379704b09226252e185ae1b0f6f
- 2f4ee1c39f78ecde5a84233233d02b355022aa50
- 6aa0b6bfe059354782febd4fa665dbacd726b488
- 9249b61b2d23546097ad2d5042d3f2f21ccbd11a
- 14fd16e6465b74c5ac4dc895f4c15bccb447af31
- f366f2730d481059a5153590ef3cab5d7658a3ef
- 54670aaf6212eeec04e2cb1bf9cff984393f29ec
- 1be33241473015788c11571ad3ab13ac82805da2
- fa681933eccc1b3cae4cce6ab6f16db08c2f2a87
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment.
- Conduct regular security assessments and vulnerability scans to identify and address potential entry points exploited by malware.
- Strengthen network defenses by employing firewalls, intrusion detection systems (IDS), and intrusion prevention systems (IPS) to monitor and block suspicious activities.
- Adopt a zero-trust security model, ensuring strict access controls and continuous verification of user and device legitimacy.
- Implement multifactor authentication (MFA) to enhance security for accessing critical systems and data.
- Ensure proper network segmentation to limit the lateral movement of attackers within the network.
- Educate and train employees on recognizing phishing attempts and social engineering tactics to reduce the risk of initial compromise.
- Regularly back up critical data and ensure backups are secure and easily accessible in case of ransomware attacks or other data loss incidents.
- Monitor and analyze network traffic for signs of command-and-control (C2) communications associated with malware infections.
- Employ threat intelligence services to stay informed about emerging threats and indicators of compromise (IOCs) related to Noodle RAT and similar malware.
- Develop and test incident response plans to ensure quick and effective action in the event of a security breach.
- Consider deploying deception technologies, such as honeypots, to detect and analyze attacker behavior and tactics.
- Collaborate with cybersecurity firms and industry groups to share information and strategies for mitigating threats posed by Noodle RAT and other sophisticated malware.
- Regularly review and update cybersecurity policies and procedures to align with the evolving threat landscape and ensure comprehensive protection against advanced threats.