New GhostAdmin Malware Used for Data Theft and Exfiltration

Share this…

Security researcher MalwareHunterTeam discovered today a new malware family that can infect computers and allow crooks to take control of these PCs using commands sent via an IRC channel.

Named GhostAdmin, this threat is part of the “botnet malware” category. According to current information, the malware is already distributed and deployed in live attacks, being used to possibly target at least two companies and steal hundreds of GBs of information.

Crooks control GhostAdmin victims via IRC commands

According to MalwareHunterTeam and other researchers that have looked at the malware’s source code, GhostAdmin seems to be a reworked version of CrimeScene, another botnet malware family that was active around 3-4 years ago.

Under the hood, GhostAdmin is written in C# and is already at version 2.0. The malware works by infecting computers, gaining boot persistence, and establishing a communications channel with its command and control (C&C) server, which is an IRC channel.

GhostAdmin’s authors access to this IRC channel and issue commands that will be picked up by all connected bots (infected computers).

The malware can interact with the victim’s filesystem, browse to specific URLs, download and execute new files, take screenshots, record audio, enable remote desktop connections, exfiltrate data, delete log files, interact with local databases, wipe browsing history and more. A full list of available commands is available via the image below:

GhostAdmin IRC commands
GhostAdmin IRC commands

The malware’s features revolve around the ability to collect data from infected computers and silently send it to a remote server.

GhostAdmin operates based on a configuration file. Among the settings stored in this file, there are FTP and email credentials.

The FTP credentials are for the server where all the stolen information is uploaded, such as screenshots, audio recordings, keystrokes and more.

On the other hand, the email credentials are used to send an email to the GhostAdmin author every time a victim executes his malware, and also send error reports.

GhostAdmin source code: Function to send an email when infecting new host
GhostAdmin source code: Function to send an email when infecting new host
GhostAdmin source code: Function to send an email when malware execution generates an error
GhostAdmin source code: Function to send an email when malware execution generates an error

MalwareHunterTeam says that the GhostAdmin version he analyzed was compiled by a user that used the nickname “Jarad.”

Like almost all malware authors before him, Jarad managed to infect his own computer. Using the FTP credentials found in the malware’s configuration file, MalwareHunterTeam found screenshots of GhostAdmin creator’s desktop on the FTP server.

Desktop of GhostAdmin author
Desktop of GhostAdmin author

Furthermore, the researcher also found on the same server files that appeared to be stolen from GhostAdmin victims. The possible victims include a lottery company and an Internet cafe. Just from the Internet cafe, the crook has apparently collected 368GB of data alone.

368GB file downloaded from GhostAdmin FTP server
368GB file downloaded from GhostAdmin FTP server

From the lottery company, the GhostAdmin botmaster appears to have stolen a database holding information such as names, dates of births, phone numbers, emails, addresses, employer information, and more.

Database found on the GhostAdmin FTP server
Database found on the GhostAdmin FTP server

At the time of writing, according to MalwareHunterTeam, the botnet’s IRC channel includes only around ten bots, an approximate victims headcount.

Compared to other botnet malware families such as Necurs or Andromeda, which have millions of bots, GhostAdmin is just making its first victims. Despite the currently low numbers, GhostAdmin can grow to those figures as well, if its author ever wanted to run a spam botnet like Necurs and Andromeda. In its current form, GhostAdmin and its botmaster seem to be focused on data theft and exfiltration.

Source:https://www.bleepingcomputer.com/