Stealc Information Stealer Malware – Active IOCs
July 25, 2025CISA Warns of Chromium 0-Day Exploited in Attacks
July 27, 2025Stealc Information Stealer Malware – Active IOCs
July 25, 2025CISA Warns of Chromium 0-Day Exploited in Attacks
July 27, 2025Severity
High
Analysis Summary
Gh0st RAT is a remote access trojan (RAT) that was first discovered in 2008. It is known for its ability to give an attacker complete control over an infected computer, including access to the victim's files, webcam, microphone, and keystrokes. Gh0st RAT is often used in targeted attacks against government and commercial organizations and has been linked to several APT (advanced persistent threat) campaigns. The malware is delivered via a phishing email or by exploiting vulnerabilities in software. Once installed, Gh0st RAT establishes a connection with a command and control server, through which the attacker can issue commands to the infected machine. Some variants of Gh0st can be used to install cryptocurrency miners and/or various trojan-type programs. Cybercriminals use these controls over the infected computer to access the victim's bank account and transfer money without authorization. It is important to keep software up to date and be cautious of phishing emails to prevent infection by Gh0st RAT or other RATs.
Impact
- Unauthorized Access
- Sensitive Information Theft
- File Manipulation
- Remote Command Execution
Indicators of Compromise
MD5
702524cd22af5f95e27d77ab38714744
10b86f7acc1f9b749495e8f4febdcb6b
4a3bf1c5f379da5e7df14c9bdf264af8
SHA-256
f76881b4366e3c1396eca234597d68f73db6534c3e2d764fcd62985036748277
450413831b00cd51755ec9372b1cf665882b75b19b8320731eddd03c0cf7dc98
8f0b498d4ff1733ae25e418045fd2635a65502018ff03f2cacbf3e9f75d3b561
SHA1
e01952257e18c4b450d7f4437b199ab3421af3a2
d2abfab6bbb5abb71d8920ed9b77be7c258e05cf
a52473477ef87af5312d130c184b14f1160ad376
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Enable antivirus and anti-malware software and update signature definitions promptly. Using multi-layered protection is necessary to secure vulnerable assets.
- Patch and upgrade any platforms and software timely and make it into a standard security policy.