gh0st RAT

gh0st RAT is a remote access tool (RAT). The source code is public and it has been used by multiple groups.[1][2][3]

ID: S0032
Associated Software: Mydoor, Moudoor
Type: MALWARE
Platforms: Windows, macOS
Version: 3.3
Created: 31 May 2017
Last Modified: 07 May 2024

Associated Software Descriptions

Name Description
Mydoor

[4]

Moudoor

[4]

Techniques Used

Domain ID Name Use
Enterprise T1112 修改注册表

gh0st RAT has altered the InstallTime subkey.[5]

Enterprise T1129 共享模块

gh0st RAT can load DLLs into memory.[5]

Enterprise T1543 .003 创建或修改系统进程: Windows Service

gh0st RAT can create a new service to establish persistence.[3][5]

Enterprise T1573 加密通道

gh0st RAT has encrypted TCP communications to evade detection.[5]

.001 Symmetric Cryptography

gh0st RAT uses RC4 and XOR to encrypt C2 traffic.[3]

Enterprise T1568 .001 动态解析: Fast Flux DNS

gh0st RAT operators have used dynamic DNS to mask the true location of their C2 behind rapidly changing IP addresses.[5]

Enterprise T1574 .002 劫持执行流: DLL Side-Loading

A gh0st RAT variant has used DLL side-loading.[2]

Enterprise T1140 反混淆/解码文件或信息

gh0st RAT has decrypted and loaded the gh0st RAT DLL into memory, once the initial dropper executable is launched.[5]

Enterprise T1547 .001 启动或登录自动启动执行: Registry Run Keys / Startup Folder

gh0st RAT has added a Registry Run key to establish persistence.[3][5]

Enterprise T1059 命令与脚本解释器

gh0st RAT is able to open a remote shell to execute commands.[1][3]

Enterprise T1113 屏幕捕获

gh0st RAT can capture the victim’s screen remotely.[3]

Enterprise T1132 .001 数据编码: Standard Encoding

gh0st RAT has used Zlib to compress C2 communications data before encrypting it.[5]

Enterprise T1106 本机API

gh0st RAT has used the InterlockedExchange, SeShutdownPrivilege, and ExitWindowsEx Windows API functions.[5]

Enterprise T1012 查询注册表

gh0st RAT has checked for the existence of a Service key to determine if it has already been installed on the system.[5]

Enterprise T1070 .001 移除指标: Clear Windows Event Logs

gh0st RAT is able to wipe event logs.[1][5]

.004 移除指标: File Deletion

gh0st RAT has the capability to to delete files.[1][5]

Enterprise T1218 .011 系统二进制代理执行: Rundll32

A gh0st RAT variant has used rundll32 for execution.[2]

Enterprise T1082 系统信息发现

gh0st RAT has gathered system architecture, processor, OS configuration, and installed hardware information.[5]

Enterprise T1569 .002 系统服务: Service Execution

gh0st RAT can execute its service if the Service key exists. If the key does not exist, gh0st RAT will create and run the service.[5]

Enterprise T1105 输入工具传输

gh0st RAT can download files to the victim’s machine.[3][5]

Enterprise T1056 .001 输入捕获: Keylogging

gh0st RAT has a keylogger.[6][5]

Enterprise T1057 进程发现

gh0st RAT has the capability to list processes.[1]

Enterprise T1055 进程注入

gh0st RAT can inject malicious code into process created by the "Command_Create&Inject" function.[5]

Enterprise T1095 非应用层协议

gh0st RAT has used an encrypted protocol within TCP segments to communicate with the C2.[5]

Groups That Use This Software

Campaigns

ID Name Description
C0016 Operation Dust Storm

[19]

References