Severity
High
Analysis Summary
Gh0st RAT is a remote access trojan (RAT) that was first discovered in 2008. It is known for its ability to give an attacker complete control over an infected computer, including access to the victim's files, webcam, microphone, and keystrokes. Gh0st RAT is often used in targeted attacks against government and commercial organizations and has been linked to several APT (advanced persistent threat) campaigns. The malware is delivered via a phishing email or by exploiting vulnerabilities in software. Once installed, Gh0st RAT establishes a connection with a command and control server, through which the attacker can issue commands to the infected machine. Some variants of Gh0st can be used to install cryptocurrency miners and/or various trojan-type programs. Cybercriminals use these controls over the infected computer to access the victim's bank account and transfer money without authorization. It is important to keep software up to date and be cautious of phishing emails to prevent infection by Gh0st RAT or other RATs.
Impact
- Unauthorized Access
- Sensitive Information Theft
- File Manipulation
- Remote Command Execution
Indicators of Compromise
MD5
c926f3e151cd0a72ebbde27bb18271e5
c62492b24b0190ca50e53fb25297317d
8a048c80bf6181b76f71b668c4ce296e
6a10ad7090717e7421af9d63daaedb22
SHA-256
5926b167cc4cd9f67d5e57dfeda355c30e5e1efed736a840d86e27589da310fa
3ae07493dd0d3528f4413224716211ef30368d9e828b38e57a500f2554271f61
96f803648c16708270f354f9996d540c6781f490e4d46790d9f2c2719e66749a
bd9583680651e5d2ae3709ce6fdbbc7bd296dcfcdbc2163160b9f6b3bdfbc1e7
SHA1
d4cb8f4b95c12188312f7655280c0eb8ee5f04f9
e17dbd57a36514ccb9471eabc887fd8c424ad810
eefe1c55f2561c93ce914151a88029e20801ca50
eaedc1d14b5d7014b8b6c70eea15b5f8576739c4
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Enable antivirus and anti-malware software and update signature definitions promptly. Using multi-layered protection is necessary to secure vulnerable assets.
- Patch and upgrade any platforms and software timely and make it into a standard security policy.

