logo_SVG-01
✕
  • Platform
    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    • Managed Security Services
    • Managed Penetration Testing
  • Services
    • Assess
      • Compromise Assessment
      • Advanced Persistent Threats Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      • SOC Maturity Assessment
      • SOC Model Evaluation
      • SOC Gap Analysis
      • SIEM Gap Analysis
      • SIEM Optimization
      • SOC Content Pack
    • Train
      • Simulated Cyber Attack Exercise
      • Tabletop Exercise
      • Security Awareness and Training
    • Respond
      • Incident Analysis
      • Incident Response
  • Solutions
  • Resources
    • Blogs
    • Press Releases
    • Threat Insights
      • Threat Intelligence Reports
      • Threat Advisories
      • Monthly Threat Insights
  • Why Rewterz?
    • About Us
    • Careers
    • Contact
logo_SVG-01
  • Platform
    xdrLogo
    center_new
    Read More about XDR

    Platform

    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    Rewterz Threat Alert – Gh0st RAT – A Decades-Old Open-Source Remote Administration Tool (RAT) – Active IOCs

    Managed Security Services

    • Managed Security Monitoring
    • Remote SOC
    • Onsite SOC
    • Hybrid SOC

    Managed Penetration Testing

    Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.

  • Services

    Assess

    • Compromise Assessment
    • APT Assessment
    • Penetration Testing
    • Architecture Design & Review
    • Red Team Assessment
    • Purple Team Assessment
    • Social Engineering
    • Source Code Review

    Transform

    • SOC Consultancy
    • SOC Maturity Assessment
    • SOC Model Evaluation
    • SOC Gap Analysis
    • SIEM Gap Analysis
    • SIEM Optimization
    • SOC Content Pack

    Train

    • Simulated Cyber Attack Exercise
    • Tabletop Exercise
    • Security Awareness and Training

    Respond

    • Incident Analysis
    • Incident Response
  • Solutions
  • Resources

    Resources

    • Blog
    • Press Releases
    September 22, 2023
    Rewterz
    September 22, 2023
    Rewterz Threat Alert – An Emerging Ducktail Infostealer – Active IOCs
    Severity High Analysis Summary Ducktail Malware is a malicious program designed by hackers to infiltrate computers and networks globally. Ducktail malware is typically delivered through a […]
    September 22, 2023
    Rewterz
    September 22, 2023
    Rewterz Threat Alert – Revenge RAT aka Revetrat – Active IOCs
    Severity Medium Analysis Summary First discovered in 2016, Revenge RAT is a remote access trojan (RAT) designed to give an attacker complete control over an infected […]
    September 22, 2023
    Rewterz
    September 22, 2023
    Rewterz Threat Alert – North Korea Linked Konni APT Group – Active IOCs
    Severity High Analysis Summary The Konni APT (Advanced Persistent Threat) group is a cyber espionage group that has been active since at least 2014. It is […]

    Threat Insights

    16
    pdf-file (1)
    Annual Threat Intelligence Report 2022
    • Threat Advisories
    • Monthly Threat Insights
    • Threat Intelligence Reports
  • Why Rewterz?

    About Us

    Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.

    Read More

    play_btn_Smallplay_btn_hover_Small
    leadership

    Our Leadership

    Our leadership team brings together years of knowledge and experience in cybersecurity to drive our company's mission and vision. Our team is passionate about delivering high-quality products and services, leading by example and assisting our clients in securing their organization’s environment.
    help

    CSR

    At Rewterz, we believe that businesses have a responsibility to impact positively and contribute to the well-being of our communities as well as the planet. That's why we are committed to operating in a socially responsible and sustainable way.

    Connect with Us

    • Contact
    • Careers
Get in Touch
logo_SVG-01
  • Platform
    xdrLogo
    center_new
    Read More about XDR

    Platform

    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    Rewterz Threat Alert – Gh0st RAT – A Decades-Old Open-Source Remote Administration Tool (RAT) – Active IOCs

    Managed Security Services

    • Managed Security Monitoring
    • Remote SOC
    • Onsite SOC
    • Hybrid SOC

    Managed Penetration Testing

    Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.

  • Services

    Assess

    • Compromise Assessment
    • APT Assessment
    • Penetration Testing
    • Architecture Design & Review
    • Red Team Assessment
    • Purple Team Assessment
    • Social Engineering
    • Source Code Review

    Transform

    • SOC Consultancy
    • SOC Maturity Assessment
    • SOC Model Evaluation
    • SOC Gap Analysis
    • SIEM Gap Analysis
    • SIEM Optimization
    • SOC Content Pack

    Train

    • Simulated Cyber Attack Exercise
    • Tabletop Exercise
    • Security Awareness and Training

    Respond

    • Incident Analysis
    • Incident Response
  • Solutions
  • Resources

    Resources

    • Blog
    • Press Releases
    September 22, 2023
    Rewterz
    September 22, 2023
    Rewterz Threat Alert – An Emerging Ducktail Infostealer – Active IOCs
    Severity High Analysis Summary Ducktail Malware is a malicious program designed by hackers to infiltrate computers and networks globally. Ducktail malware is typically delivered through a […]
    September 22, 2023
    Rewterz
    September 22, 2023
    Rewterz Threat Alert – Revenge RAT aka Revetrat – Active IOCs
    Severity Medium Analysis Summary First discovered in 2016, Revenge RAT is a remote access trojan (RAT) designed to give an attacker complete control over an infected […]
    September 22, 2023
    Rewterz
    September 22, 2023
    Rewterz Threat Alert – North Korea Linked Konni APT Group – Active IOCs
    Severity High Analysis Summary The Konni APT (Advanced Persistent Threat) group is a cyber espionage group that has been active since at least 2014. It is […]

    Threat Insights

    16
    pdf-file (1)
    Annual Threat Intelligence Report 2022
    • Threat Advisories
    • Monthly Threat Insights
    • Threat Intelligence Reports
  • Why Rewterz?

    About Us

    Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.

    Read More

    play_btn_Smallplay_btn_hover_Small
    leadership

    Our Leadership

    Our leadership team brings together years of knowledge and experience in cybersecurity to drive our company's mission and vision. Our team is passionate about delivering high-quality products and services, leading by example and assisting our clients in securing their organization’s environment.
    help

    CSR

    At Rewterz, we believe that businesses have a responsibility to impact positively and contribute to the well-being of our communities as well as the planet. That's why we are committed to operating in a socially responsible and sustainable way.

    Connect with Us

    • Contact
    • Careers
Get in Touch
Rewterz
Rewterz Threat Advisory – Multiple Fortinet FortiOS and FortiProxy Vulnerabilities
June 19, 2023
Rewterz
Rewterz Threat Advisory – CVE-2023-32535 – Trend Micro Apex Central Vulnerability
June 19, 2023

Rewterz Threat Alert – Gh0st RAT – A Decades-Old Open-Source Remote Administration Tool (RAT) – Active IOCs

June 19, 2023

Severity

High

Analysis Summary

Gh0st RAT is a remote administration tool (RAT) that was created by a Chinese hacking group called C. Rufus Security Team in 2008. It was released as open-source software, which made it widely available and easy for threat actors to obtain and customize. Gh0st RAT has a range of features, including surveillance, persistence, and information stealing capabilities. It can be used to remotely access and control infected systems, steal sensitive information, and perform a variety of malicious actions. The tool has been used in various cyber attacks and is a known threat to organizations, particularly those in sensitive industries such as healthcare.

Gh0st RAT has a long history of being used by Chinese nation-state threat actors to target high-value organizations, such as governments, embassies, economic targets, and media. One notable operation was the GhostNet operation in 2009, which used Gh0st RAT to conduct surveillance and espionage on the Dalai Lama’s Tibetan exile centers in multiple countries. Despite being first identified almost 15 years ago, Gh0st RAT is still actively distributed today, as evidenced by the recent phishing campaign targeting a European-owned medical technology organization in China. The malware was delivered via an embedded link affiliated with Tencent and based in Hong Kong, and the C2 server was located on the CHINANET Jiangsu province network in the city of Nanjing. This highlights the ongoing threat posed by Gh0st RAT and the need for organizations to remain vigilant against such attacks.

phishing email to deliver Gh0st RAT via an embedded link: source

To protect against Gh0st RAT and other types of malware, it is important to keep your operating system and software up-to-date, use strong passwords and two-factor authentication, and avoid opening suspicious emails or downloading files from untrusted sources. Additionally, using anti-virus software and performing regular system scans can help detect and remove any potential infections.

Impact

  • Credential Theft
  • Unauthorized Access
  • Theft of Sensitive Information
  • File manipulation
  • Remote command execution

Indicators of Compromise

MD5

  • 99d3b263866a565ce24819e430c4e802
  • 5f81262f5577b8a3e0ac70b25c7a706e
  • c1cce28493f6d1dc7d8ac1a1c294d2fe
  • be2a1668352f1be7c355b94d5b942721

SHA-256

  • aecead7bb0ec85e54dc902a2d02a6051b70b1a5d273c839a41a9f1246872d7b4
  • df220b8608808820d98603530b37c943fcd84f80d5086d23de669e53e22c4143
  • 3fdc52a387a12b0bf5ef0cc14d57cb08e52a66774c0069625c05d2260ca2fdf5
  • 9e53bc6c5fcbb2a32ca55647e429318879a80077aeb83a45f9745fce86e3ff8c

SHA-1

  • d5c6e0962320324c2e5082bd090ca9bbd8c7e3aa
  • 455a45c9f875c42a8980c4196424419b6222c19c
  • 94c02fad70a1ae191aaff02d2f26895a33ef80c8
  • 6012e12e862862760cd8e507e20621837aa8348b

Remediation

  • Block all threat indicators at your respective controls.
  • Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls
  • Enable antivirus and anti-malware software and update signature definitions in a timely manner. Using multi-layered protection is necessary to secure vulnerable assets
  • Patch and upgrade any platforms and software timely and make it into a standard security policy.
  • Keep your operating system and software up-to-date: Gh0st RAT can exploit vulnerabilities in outdated operating systems and software. By keeping your system up-to-date with the latest security patches and updates, you can reduce the risk of being infected with Gh0st RAT.
  • Use strong passwords and two-factor authentication: Strong passwords and two-factor authentication can make it more difficult for attackers to gain unauthorized access to your system.
  • Be cautious with email attachments and links: Gh0st RAT can be distributed through phishing emails with malicious attachments or links. Be wary of emails from unknown senders and avoid opening attachments or clicking on links unless you are sure they are safe.
  • Use a firewall: A firewall can help block unauthorized traffic from entering your system and prevent Gh0st RAT from connecting to its command and control servers.
  • Regularly back up your important data: Backing up your data regularly can help you recover from a Gh0st RAT infection and minimize the impact of any data loss.
  • It’s important to note that prevention is key when it comes to Gh0st RAT and other types of malware. By following these recommendations and staying vigilant, you can reduce the risk of being infected and protect your system and data.

Platform

  • Rewterz XDR
  • Rewterz Defense
  • Rewterz Threat Intelligence

Managed Security Services

  • Managed Security Monitoring
  • Remote SOC
  • Onsite SOC
  • Hybrid SOC

Assess

  • Compromise Assessment
  • APT Assessment
  • Penetration Testing
  • Architecture Design & Review
  • Red Team Assessment
  • Purple Team Assessment
  • Social Engineering
  • Source Code Review

Transform

  • SOC Consultancy
  • SOC Maturity Assessment
  • SOC Model Evaluation
  • SOC Gap Analysis
  • SIEM Gap Analysis
  • SIEM Optimization
  • SOC Content Pack

Train

  • Simulated Cyber Attack Exercise
  • Tabletop Exercise
  • Security Awareness and Training

Respond

  • Incident Analysis
  • Incident Response

Threat Insights

  • Threat Advisories
  • Monthly Threat Insights
  • Threat Intelligence Reports

Resources

  • Blog
  • Press Releases

Connect With Us

  • Contact
  • Careers
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.
Get a Demo