Severity
High
Analysis Summary
Gh0st RAT is a remote access trojan (RAT) that was first discovered in 2008. It is known for its ability to give an attacker complete control over an infected computer, including access to the victim's files, webcam, microphone, and keystrokes. Gh0st RAT is often used in targeted attacks against government and commercial organizations and has been linked to several APT (advanced persistent threat) campaigns. The malware is delivered via a phishing email or by exploiting vulnerabilities in software. Once installed, Gh0st RAT establishes a connection with a command and control server, through which the attacker can issue commands to the infected machine. Some variants of Gh0st can be used to install cryptocurrency miners and/or various trojan-type programs. Cybercriminals use these controls over the infected computer to access the victim's bank account and transfer money without authorization. It is important to keep software up to date and be cautious of phishing emails to prevent infection by Gh0st RAT or other RATs.
Impact
- Unauthorized Access
- Sensitive Information Theft
- File Manipulation
- Remote Command Execution
Indicators of Compromise
MD5
ced691c3166e64e42c6893aefaef9bbc
64f67d9fe4336d1dadf961629ee2c60b
c38d4c44299900262ead7357c244029d
SHA-256
589a33f90aa5c137188dd7d45319967da0252d468b6f5c02e875c3b7cd86df4c
f75445cdbc126869a4a3d7621e15881d1f0173c1cfaeb1be7ef8358e0da2d5c3
6e46826d1adf2d0674e91b610df825620f2eef0f17b8280a6ae9362d39354e44
SHA1
34e93ea668bfa12a4e1f800760213381e2e55083
b94ff5c3523bf94f3eccedff9f8caaf3acd24818
30b24d635cb53b3f0bbc7ec0f39942cdeea3c873
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Enable antivirus and anti-malware software and update signature definitions promptly. Using multi-layered protection is necessary to secure vulnerable assets.
- Patch and upgrade any platforms and software timely and make it into a standard security policy.