Rewterz
Multiple Microsoft Windows Products Vulnerabilities
September 22, 2025
Rewterz
Threat Actor Claims Breach of American Income Life Insurance
September 22, 2025

AI Malware ‘MalTerminal’ Uses GPT-4 for Ransomware – Active IOCs

Severity

High

Analysis Summary

Recent research has uncovered a new class of AI-powered malware, exemplified by MalTerminal, which leverages OpenAI’s GPT-4 to dynamically generate malicious code such as ransomware and reverse shells. Unlike traditional malware that carries static payloads, MalTerminal operates as a malware generator, creating unique malicious scripts at runtime based on operator input. This represents a significant shift in threat development, making detection through signature-based methods increasingly ineffective.

This trend follows the discovery of PromptLock, an AI-driven malware proof-of-concept developed by researchers at New York University. PromptLock runs a local LLM using the Ollama API and generates malicious Lua scripts in real-time across multiple platforms, including Windows, Linux, and macOS. It can autonomously identify the type of infected system and decide whether to exfiltrate or encrypt data using SPECK 128-bit encryption, demonstrating the potential sophistication of AI-enabled threats.

Researchers identified MalTerminal in the wild by focusing on artifacts unique to LLM integration, such as hardcoded API keys and embedded prompt structures. The malware, discovered in Python scripts and a Windows executable, uses a deprecated OpenAI API endpoint, suggesting it was created before November 2023. Its design avoids storing malicious logic in the binary, allowing it to bypass static analysis and traditional security tools. Related scripts, including early test versions and a defensive tool named FalconShield, indicate ongoing experimentation by the malware author.

While AI-powered malware like MalTerminal and PromptLock presents new challenges for defenders, they also introduce potential weaknesses. Their dependence on external APIs, local models, and hardcoded prompts creates points of failure; revoking API keys or blocking models can render the malware inoperable. These findings highlight the need for cybersecurity teams to adapt strategies toward detecting anomalous API usage and prompt activity, signaling a pivotal moment in the evolution of threat actor capabilities.

Impact

  • Sensitive Data Theft
  • Gain Access
  • Security Bypass
  • Encrypt Data

Indicators of Compromise

MD5

  • 651d69c843f827f9ed871f595ffa15e5
  • 636e13c7b4c334503e313d82d9f7e5a1
  • f882565b93ddaf86c2e1978cad43487a
  • 81cd20319c8f0b2ce499f9253ce0a6a8
  • 3ca2eaf204611f3314d802c8b794ae2c
  • 40b179e334fd12241823e4ad353bb96d
  • cafe08392d476a057d85de4983bac94e
  • 806f552041f211a35e434112a0165568
  • ed229f3442f2d45f6fdd4f3a4c552c1c
  • ac377e26c24f50b4d9aaa933d788c18c

SHA-256

  • dc9f49044d16abfda299184af13aa88ab2c0fda9ca7999adcdbd44e3c037a8b1
  • 3082156a26534377a8a8228f44620a5bb00440b37b0cf7666c63c542232260f2
  • 2eb18873273e157a7244bb165d53ea3637c76087eea84b0ab635d04417ffbe1b
  • 384e8f3d300205546fb8c9b9224011b3b3cb71adc994180ff55e1e6416f65715
  • d6af1c9f5ce407e53ec73c8e7187ed804fb4f80cf8dbd6722fc69e15e135db2e
  • cf4d430d0760d59e2fa925792f9e2b62d335eaf4d664d02bff16dd1b522a462a
  • a30930dfb655aa39c571c163ada65ba4dec30600df3bf548cc48bedd0e841416
  • 09bf891b7b35b2081d3ebca8de715da07a70151227ab55aec1da26eb769c006f
  • e24fe0dd0bf8d3943d9c4282f172746af6b0787539b371e6626bdb86605ccd70
  • 2755e1ec1e4c3c0cd94ebe43bd66391f05282b6020b2177ee3b939fdd33216f6

SHA1

  • b0deb274d35e0aed0669623b3575403c0ecee5f6
  • 5ff35cfd6d5e606baa4625609a53a551b087e241
  • 1022fb56fb10c232267c199a625495ab9ddba37d
  • 569ff9213b030ab862c5cadacaad8159a0a2c627
  • cc06e6373be0a426e741f97f560d4d97a3f28dfa
  • a0a7ac2316ce779700a56ea65314ff229ee5451b
  • e065bec7855235dedfec5e66392b81b7a2234d0b
  • f3f4c40c344695388e10cbf29ddb18ef3b61f7ef
  • 639dbc9b365096d6347142fcae64725bd9f73270
  • 24bf7b72f54aa5b93c6681b4f69e579a47d7c102

Remediation

  • Block all threat indicators at your respective controls.
  • Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
  • Never trust or open links and attachments received from unknown sources/senders.
  • Upgrade your operating system.
  • Enable antivirus and anti-malware software and update signature definitions on time. Using multi-layered protection is necessary to secure vulnerable assets.
  • Immediately change default passwords on IoT devices to unique ones.
  • Keep devices' firmware and software up to date to ensure that known vulnerabilities are patched.
  • Implement firewalls and intrusion detection systems to monitor and control traffic to and from IoT devices.
  • Employ tools that can identify unusual behavior or traffic patterns that might indicate a DDoS attack or a compromised device.
  • Disable any unnecessary services or features on IoT devices to reduce their attack surface.
  • Follow security best practices, such as disabling remote management if not needed and enabling security features provided by the device manufacturer.
  • Deploy intrusion detection and prevention systems (IDS/IPS) to monitor for anomalous or malicious network activity.
  • Set up alerts for unusual traffic patterns that might indicate a DDoS attack or a compromised device.