Skip to main content

Famous Chollima deploying Python version of GolangGhost RAT

Medium
Published: Wed Jun 18 2025 (06/18/2025, 17:19:11 UTC)
Source: AlienVault OTX General

Description

In May 2025, Cisco Talos identified a Python-based remote access trojan (RAT) called 'PylangGhost', used by a North Korean-aligned threat actor. PylangGhost shares similarities with the previously documented GolangGhost RAT. The threat actor, Famous Chollima, has been targeting employees with experience in cryptocurrency and blockchain technologies through fake job interview sites. The attacks primarily affect users in India. The malware is deployed through a two-stage process involving fake skill-testing pages and malicious command execution. PylangGhost consists of six Python modules and offers functionalities similar to its Golang counterpart, including system information collection, file manipulation, and browser data theft from over 80 extensions.

AI-Powered Analysis

AILast updated: 06/18/2025, 20:02:17 UTC

Technical Analysis

In May 2025, Cisco Talos identified a new Python-based remote access trojan (RAT) named 'PylangGhost,' deployed by the North Korean-aligned threat actor group Famous Chollima. This malware is a variant of the previously known GolangGhost RAT, re-implemented in Python to potentially increase flexibility and evade detection. PylangGhost targets individuals with expertise in cryptocurrency and blockchain technologies, primarily through social engineering tactics involving fake job interview websites. The infection chain is a two-stage process: initially, victims are lured to skill-testing pages designed to appear legitimate, which then trigger malicious command execution to deploy the RAT. Technically, PylangGhost is modular, comprising six Python modules that collectively provide capabilities such as system information gathering, file manipulation, and extensive browser data theft. Notably, it can extract data from over 80 browser extensions, which is significant given the sensitive information often stored or accessible via these extensions, including cryptocurrency wallets and authentication tokens. The malware leverages multiple MITRE ATT&CK techniques, including scheduled task execution (T1053.005), system information discovery (T1082), credential access (T1555), and command and scripting interpreter usage (T1059.001 and T1059.006), among others. This indicates a sophisticated approach to persistence, reconnaissance, and data exfiltration. The campaign currently primarily affects users in India, focusing on blockchain and cryptocurrency professionals, but the modular and Python-based nature of the RAT suggests potential adaptability to other environments and targets. There are no known exploits in the wild associated with this malware, and no specific affected software versions have been identified. The threat actor's use of fake job portals as a vector highlights a targeted social engineering approach rather than broad exploitation of software vulnerabilities.

Potential Impact

For European organizations, the impact of PylangGhost could be significant, especially for entities involved in blockchain, cryptocurrency, fintech, and related sectors. The malware's capability to steal browser data from numerous extensions poses a direct threat to the confidentiality of sensitive credentials, private keys, and session tokens, potentially leading to financial theft, unauthorized access, and further lateral movement within networks. The system information gathering and file manipulation functionalities could facilitate espionage, data exfiltration, and disruption of operations. Although the current campaign targets individuals in India, European professionals with similar profiles or working in multinational companies with blockchain interests could be targeted in future campaigns. Additionally, the use of Python modules makes detection more challenging in environments relying heavily on signature-based detection, increasing the risk of prolonged undetected presence. The social engineering vector also underscores the risk of insider compromise or credential theft, which could cascade into broader organizational impacts.

Mitigation Recommendations

To mitigate the risk posed by PylangGhost, European organizations should implement targeted measures beyond generic advice: 1. Enhance Email and Web Filtering: Deploy advanced filtering solutions capable of detecting and blocking phishing sites, especially those masquerading as job portals or skill-testing platforms related to blockchain and cryptocurrency. 2. User Awareness Training: Conduct specialized training for employees in blockchain and cryptocurrency roles to recognize social engineering tactics, particularly fake job offers and interview processes. 3. Application Whitelisting and Execution Control: Restrict execution of unauthorized Python scripts and modules, especially from user directories or temporary locations, using application control policies. 4. Monitor for MITRE ATT&CK Techniques: Implement detection rules for behaviors such as scheduled task creation (T1053.005), credential dumping (T1555), and suspicious command interpreter usage (T1059.001/006). 5. Browser Extension Management: Audit and limit browser extensions to only those necessary, and monitor for unusual access patterns or data exfiltration attempts related to extensions. 6. Network Segmentation and Egress Monitoring: Segment networks to limit lateral movement and monitor outbound traffic for anomalous connections indicative of data exfiltration. 7. Incident Response Preparedness: Develop playbooks specific to RAT infections, including forensic analysis of Python modules and containment strategies. 8. Threat Intelligence Sharing: Engage with European cybersecurity communities to share indicators and tactics related to Famous Chollima and PylangGhost to enhance collective defense.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://blog.talosintelligence.com/python-version-of-golangghost-rat/"]
Adversary
Famous Chollima
Pulse Id
6852f50f8e7fb42e2328c1c5
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash09b93b77c9f7c28151aca977d95eaa13
hashbe20cf6b1ebe922a8076245112307e86e615523d
hash0d14960395a9d396d413c2160570116e835f8b3200033a0e4e150f5e50b68bec
hash0ec9d355f482a292990055a9074fdabdb75d72630b920a61bdf387f2826f5385
hash127406b838228c39b368faa9d6903e7e712105b5ad8f43a987a99f7b10c29780
hash1f482ce7e736a8541cc16e3e80c7890d13fb1f561ae38215a98a75dce1333cee
hash267009d555f59e9bf5d82be8a046427f04a16d15c63d9c7ecca749b11d8c8fc3
hash28198494f0ed5033085615a57573e3d748af19e4bd6ea215893ebeacf6e576df
hash5273d68b3aef1f5ebf420b91d66a064e34c4d3495332fd492fecb7ef4b19624e
hash7ac3ffb78ae1d2d9b5d3d336d2a2409bd8f2f15f5fb371a1337dd487bd471e32
hash8ead05bb10e6ab0627fcb3dd5baa59cdaab79aa3522a38dad0b7f1bc0dada10a
hash929c69827cd2b03e7b03f9a53c08268ab37c29ac4bd1b23425f66a62ad74a13b
hasha206ea9b415a0eafd731b4eec762a5b5e8df8d9007e93046029d83316989790a
hashb7ab674c5ce421d9233577806343fc95602ba5385aa4624b42ebd3af6e97d3e5
hashb8402db19371db55eebea08cf1c1af984c3786d03ff7eae954de98a5c1186cee
hashc2137cd870de0af6662f56c97d27b86004f47b866ab27190a97bde7518a9ac1b
hashc2d2320ae43aaa0798cbcec163a0265cba511f8d42d90d45cd49a43fe1c40be6
hashd029be4142fca334af8fe0f5f467a0e0e1c89d3b881833ee53c1e804dc912cfd
hashd3500266325555c9e777a4c585afc05dfd73b4cbe9dba741c5876593b78059fd
hashe7c2b524f5cb0761a973accc9a4163294d678f5ce6aca73a94d4e106f4c8fea4
hashed170975e3fd03440360628f447110e016f176a44f951fcf6bc8cdb47fbd8e0e
hashfb5362c4540a3cbff8cb1c678c00cc39801dc38151edc4a953e66ade3e069225
hashfc71a1df2bb4ac2a1cc3f306c3bdf0d754b9fab6d1ac78e4eceba5c6e7aee85d

Domain

ValueDescriptionCopy
domainassesstrack.com
domaindigitaltalent.review
domainevalassesso.com
domainevalswift.com
domainfast-video-recording.com
domainkrakenhire.com
domainlivetalentpro.com
domainprovevidskillcheck.com
domainquantumnodespro.com
domainquiz-nest.com
domaintalent-hiringtalk.com
domainapi.auto-fixer.online
domainapi.autocamfixer.online
domainapi.autodriverfix.online
domainapi.camdriversupport.com
domainapi.camera-drive.org
domainapi.camtechdrivers.com
domainapi.camtuneup.online
domainapi.drive-release.cloud
domainapi.drivercams.cloud
domainapi.driversofthub.online
domainapi.fixdiskpro.online
domainapi.nvidia-drive.cloud
domainapi.nvidia-release.org
domainapi.nvidia-release.us
domainapi.quickcamfix.online
domainapi.quickdriverupdate.online
domainapi.smartdriverfix.cloud
domainapi.vcamfixer.online
domainapi.web-cam.cloud
domaincoinbase.talenthiringtool.com
domaincoinbase.talentmonitoringtool.com
domaincrosstheages.skillence360.com
domaindoodles.skillquestions.com
domainkraken.livehiringpro.com
domainparallel.eskillora.com
domainparallel.eskillprov.com
domainrobinhood.ecareerscan.com
domainskill.vidintermaster.com
domainuniswap.prehireiq.com
domainuniswap.speakure.com
domainuniswap.testforhire.com
domainwww.hireviavideo.com
domainwww.smartvideohire.com
domainwww.talent-hiringstep.com
domainyuga.skillquestions.com

Threat ID: 685317a933c7acc046074f60

Added to database: 6/18/2025, 7:46:49 PM

Last enriched: 6/18/2025, 8:02:17 PM

Last updated: 8/17/2025, 11:29:27 PM

Views: 50

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats