HomeData BreachNew GodRAT Trojan Targets Buying and selling Companies Utilizing Steganography and Gh0st...

New GodRAT Trojan Targets Buying and selling Companies Utilizing Steganography and Gh0st RAT Code

Monetary establishments like buying and selling and brokerage companies are the goal of a brand new marketing campaign that delivers a beforehand unreported distant entry trojan known as GodRAT.

The malicious exercise entails the “distribution of malicious .SCR (display saver) information disguised as monetary paperwork by way of Skype messenger,” Kaspersky researcher Saurabh Sharma stated in a technical evaluation printed in the present day.

The assaults, which have been energetic as just lately as August 12, 2025, make use of a method known as steganography to hide inside picture information shellcode used to obtain the malware from a command-and-control (C2) server. The display saver artifacts have been detected since September 9, 2024, concentrating on nations and territories like Hong Kong, the United Arab Emirates, Lebanon, Malaysia, and Jordan.

Assessed to be primarily based on Gh0st RAT, GodRAT follows a plugin-based method to reinforce its performance in an effort to harvest delicate data and ship secondary payloads like AsyncRAT. It is value mentioning that Gh0st RAT had its supply code leaked publicly in 2008 and has since been adopted by varied Chinese language hacking teams.

Cybersecurity

The Russian cybersecurity firm stated the malware is an evolution of one other Gh0st RAT-based backdoor generally known as AwesomePuppet that was first documented in 2023 and is probably going believed to be the handiwork of the prolific Chinese language menace actor, Winnti (aka APT41).

See also  BreachForums hacking discussion board admin resentenced to a few years in jail

The display saver information act as a self-extracting executable incorporating varied embedded information, together with a malicious DLL that is sideloaded by a legit executable. The DLL extracts shellcode hidden inside a .JPG picture file that then paves the way in which for the deployment of GodRAT.

The trojan, for its half, establishes communication with the C2 server over TCP, collects system data, and pulls the listing of put in antivirus software program on the host. The captured particulars are despatched to the C2 server, after which the server responds with follow-up directions that enable it to –

  • Inject a obtained plugin DLL into reminiscence
  • Shut the socket and terminate the RAT course of
  • Obtain a file from a offered URL and launch it utilizing the CreateProcessA API
  • Open a given URL utilizing the shell command for opening Web Explorer

One of many plugins downloaded by the malware is a FileManager DLL that may enumerate the file system, carry out file operations, open folders, and even run searches for information at a specified location. The plugin has additionally been used to ship extra payloads, similar to a password stealer for Google Chrome and Microsoft Edge browsers and the AsyncRAT trojan.

See also  Cybercriminals Deploy CORNFLAKE.V3 Backdoor through ClickFix Tactic and Faux CAPTCHA Pages

Kaspersky stated it found the whole supply code for the GodRAT shopper and builder that was uploaded to the VirusTotal on-line malware scanner in late July 2024. The builder can be utilized to generate both an executable file or a DLL.

Identity Security Risk Assessment

When the executable choice is chosen, customers have the selection of choosing a legit binary from a listing to which the malicious code is injected into: svchost.exe, cmd.exe, cscript.exe, curl.exe, wscript.exe, QQMusic.exe and QQScLauncher.exe. The ultimate payload may be saved with one of many following file sorts: .exe, .com, .bat, .scr, and .pif.

“Previous implant codebases, similar to Gh0st RAT, that are almost 20 years previous, proceed for use in the present day,” Kaspersky stated. “These are sometimes custom-made and rebuilt to focus on a variety of victims.”

“These previous implants are recognized to have been utilized by varied menace actors for a very long time, and the GodRAT discovery demonstrates that legacy codebases like Gh0st RAT can nonetheless keep an extended lifespan within the cybersecurity panorama.”

See also  Is Microsoft the precise social gathering to speak in regards to the Flax Hurricane?
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular