

New Malware ‘Noodle RAT’ Targets Linux and Windows Users – Active IOCs
June 16, 2024
An Emerging Ducktail Infostealer – Active IOCs
June 17, 2024
New Malware ‘Noodle RAT’ Targets Linux and Windows Users – Active IOCs
June 16, 2024
An Emerging Ducktail Infostealer – Active IOCs
June 17, 2024Severity
High
Analysis Summary
Gh0st RAT is a remote access trojan (RAT) that was first discovered in 2008. It is known for its ability to give an attacker complete control over an infected computer, including access to the victim's files, webcam, microphone, and keystrokes. Gh0st RAT is often used in targeted attacks against government and commercial organizations and has been linked to several APT (advanced persistent threat) campaigns. The malware is delivered via a phishing email or by exploiting vulnerabilities in software. Once installed, Gh0st RAT establishes a connection with a command and control server, through which the attacker can issue commands to the infected machine. Some variants of Gh0st can be used to install cryptocurrency miners and/or various trojan-type programs. Cybercriminals use these controls over the infected computer to access the victim's bank account and transfer money without authorization. It is important to keep software up to date and be cautious of phishing emails to prevent infection by Gh0st RAT or other RATs.
Impact
- Unauthorized Access
- Sensitive Information Theft
- File Manipulation
- Remote Command Execution
Indicators of Compromise
MD5
- eb896b51453c804f14c11eee64c0ff79
- e9d6f283acc3e4fd3682d67fb7a0511f
- 4d94b714b84240380b4a9f37c7e53543
- 72bc650e6f4faa70ec4369109943381d
- ee89f7922a4ccc1147e7c427c832a35a
- e6a1b79aceb1a98016c6edcf8f3d0a65
- b4f342daa9b2667d133ce22d6fc6997c
SHA-256
- 311198eeb76c5cb081151452a73159c194300121515e3fd875429152ae7761aa
- 0dbd951b6a7b43300cf161aa7df612560c38a92743c47b71b034aec4f54c51c7
- 30af33cc275298269f2f8bb65529f0861090d49984d2200fa21812bdd558174a
- f07465ea271cedaffa98eb8fe5160e9f50c71b326826cf32c6ce618955bc18bb
- acb615b72532d8020f1fa9afa65c44bd67caa1ec83f39f4b029287e70c344d0b
- 122f13fcffd3a8747c05829fa21c72dbda254412d88e43625906915f1b9ef4cb
- 0f72e9eb5201b984d8926887694111ed09f28c87261df7aab663f5dc493e215f
SHA1
- e13b7ab9b10d698bb766141fccae0e7cf19c7195
- fad06ab157ad97e51b29c91b4983cb820b95cf98
- 884a0ed4a4e734e7af44656db59f3161a748b131
- 343d4e7b330dbdca32e2d4272bfe1bbae6c999b2
- 573708eaf5ea90720c55c54e0dba672a18bc0d32
- bddca6de5c54d2c38d78a102c05fd3bc89c7adf1
- 4cd9fe4576f28595783bd920cbaf890994e21f8c
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Enable antivirus and anti-malware software and update signature definitions promptly. Using multi-layered protection is necessary to secure vulnerable assets.
- Patch and upgrade any platforms and software timely and make it into a standard security policy.