Severity
High
Analysis Summary
Gh0st RAT is a remote access trojan (RAT) that was first discovered in 2008. It is known for its ability to give an attacker complete control over an infected computer, including access to the victim's files, webcam, microphone, and keystrokes. Gh0st RAT is often used in targeted attacks against government and commercial organizations and has been linked to several APT (advanced persistent threat) campaigns. The malware is delivered via a phishing email or by exploiting vulnerabilities in software. Once installed, Gh0st RAT establishes a connection with a command and control server, through which the attacker can issue commands to the infected machine. Some variants of Gh0st can be used to install cryptocurrency miners and/or various trojan-type programs. Cybercriminals use these controls over the infected computer to access the victim's bank account and transfer money without authorization. It is important to keep software up to date and be cautious of phishing emails to prevent infection by Gh0st RAT or other RATs.
Impact
- Unauthorized Access
- Sensitive Information Theft
- File Manipulation
- Remote Command Execution
Indicators of Compromise
MD5
c43aebf6418d72b19fca46bdc2b70b36
b2820ad9d92b5580a79a9c51925b4e1a
11de25a5a4dca2ea18592acd26cb8ad7
SHA-256
6c98414b8cd5900ad18b34ad416e7a98fefa2794cdbfed6351c3af828594ece3
8d15b4160b15eb30d6a0793ee8264b3a9a7c52bb8eb4dd3edb39a7a2ffb26fa3
b7de401c758ce95340b9b42d21d86b30e631b001f96834aa02122b38a7bd881e
SHA1
e34b708dbc103ec228bd7f88924210db38cfaf74
bca7d3fee53677daf505f7939a7658cd838ea0e5
1d7475056a4ab5c87fc75f0a543c96dc5157929b
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Enable antivirus and anti-malware software and update signature definitions promptly. Using multi-layered protection is necessary to secure vulnerable assets.
- Patch and upgrade any platforms and software timely and make it into a standard security policy.

