

Multiple GitLab Products Vulnerabilities
January 23, 2025
QakBot-Associated BC Malware Upgraded with Advanced Remote Access and Data Collection Capabilities – Active IOCs
January 23, 2025
Multiple GitLab Products Vulnerabilities
January 23, 2025
QakBot-Associated BC Malware Upgraded with Advanced Remote Access and Data Collection Capabilities – Active IOCs
January 23, 2025Severity
High
Analysis Summary
Gh0st RAT is a remote access trojan (RAT) that was first discovered in 2008. It is known for its ability to give an attacker complete control over an infected computer, including access to the victim's files, webcam, microphone, and keystrokes. Gh0st RAT is often used in targeted attacks against government and commercial organizations and has been linked to several APT (advanced persistent threat) campaigns. The malware is delivered via a phishing email or by exploiting vulnerabilities in software. Once installed, Gh0st RAT establishes a connection with a command and control server, through which the attacker can issue commands to the infected machine. Some variants of Gh0st can be used to install cryptocurrency miners and/or various trojan-type programs. Cybercriminals use these controls over the infected computer to access the victim's bank account and transfer money without authorization. It is important to keep software up to date and be cautious of phishing emails to prevent infection by Gh0st RAT or other RATs.
Impact
- Unauthorized Access
- Sensitive Information Theft
- File Manipulation
- Remote Command Execution
Indicators of Compromise
MD5
407c9a93188dc7088e19d688a589c8c5
21bb462f0f0a3f4156bb6d46f95d689d
ebbf718b7130178fe7967500e6f9748e
SHA-256
924c4682daa9e4f5dbb41a71458e6d37a927f86c01465ad209f9c78fe17973da
ac7bbace6a05f3ea6422306fe0f41c3a5252579c3a584150e9628f53a7805b50
e69239742f4d6d661dbc045731b5e2a2afb79968204ff906cfb08701f00283db
SHA1
84d1a6c7f6efec64a1a9f7ebdbc7b7b8a3bb0294
2f2ed26926fdcb869fe9398ee8cffea2e4b3b004
8ae149b42cad114ee5cf626f1bcd1943a5e4ce85
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Enable antivirus and anti-malware software and update signature definitions promptly. Using multi-layered protection is necessary to secure vulnerable assets.
- Patch and upgrade any platforms and software timely and make it into a standard security policy.