Gh0st RAT and CloverPlus Adware - New Dual-Payload Malware

A new malware campaign is delivering both Gh0st RAT and CloverPlus adware simultaneously. This dual threat allows attackers to control systems and generate revenue. Security teams must enhance their defenses against this evolving threat.

Malware & RansomwareHIGHUpdated: Published:
Featured image for Gh0st RAT and CloverPlus Adware - New Dual-Payload Malware

Original Reporting

CSCyber Security News·Tushar Subhra Dutta

AI Summary

CyberPings AI·Reviewed by Rohit Rana

🎯Basically, attackers are using one program to install two types of malware on victims' computers.

What Happened

A newly identified malware campaign has raised alarms in the cybersecurity community. Attackers are now using a single, obfuscated loader to deliver two different threats: the Gh0st Remote Access Trojan (RAT) and CloverPlus adware. This dual-payload strategy allows attackers to maintain long-term control over compromised systems while simultaneously generating revenue through ad fraud.

How It Works

The loader is designed to be stealthy, hiding two encrypted payloads within its resource section. The first payload released is the CloverPlus adware, which modifies browser settings and injects unwanted advertisements. Once this is executed, the loader checks its file path and drops a copy of itself in the system's %temp% folder. It then decrypts the Gh0st RAT client module, which is stored as an encrypted resource.

The Gh0st RAT is launched using the legitimate Windows application rundll32.exe, allowing it to execute under a trusted system process. This method reduces the likelihood of detection by standard security tools. Once active, Gh0st RAT collects system information and establishes a connection to the attacker's command-and-control infrastructure.

Who's Being Targeted

This malware campaign targets both individuals and organizations. The adware disrupts browser functionality, while the RAT can steal sensitive data, capture keystrokes, and provide persistent access to attackers. The combination of these threats makes it a significant risk for any compromised system.

Signs of Infection

Indicators of infection include:

🔴

Unusual browser behavior,

Unusual browser behavior, such as unexpected pop-ups.

🟡

wiseman.exe

in system processes.

🟠

Modifications to registry

Modifications to registry keys related to system services.

How to Protect Yourself

Security teams are urged to enhance their endpoint monitoring capabilities. Here are some recommended actions: This campaign highlights a shift towards more complex malware delivery strategies, emphasizing the need for robust security measures and constant vigilance.

Detection

  • 1.Monitor for rundll32.exe loading non-standard file extensions from unusual directories.
  • 2.Flag any process execution originating from the %temp% folder.

Removal

  • 3.Set alerts for registry modifications to Run keys and RemoteAccess service paths.
  • 4.Keep detection rules updated to align with MITRE ATT&CK techniques relevant to this malware.

🔒 Pro Insight

🔒 Pro insight: The dual-payload approach signifies a strategic evolution in malware delivery, increasing both persistence and monetization opportunities for attackers.

CSCyber Security News· Tushar Subhra Dutta
Read Original

Related Pings