Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

From open-source to open threat: Tracking Chaos RAT’s evolution

0
Medium
Published: Fri Jun 06 2025 (06/06/2025, 11:02:59 UTC)
Source: AlienVault OTX General

Description

Chaos RAT is an open-source remote administration tool written in Golang that has evolved since 2022 to support both Linux and Windows platforms. It offers cross-platform compatibility and is exploited by threat actors to control compromised systems via an administrative panel. Recent variants have improved configuration encoding and expanded capabilities. A critical vulnerability (CVE-2024-30850) in its web control panel allows remote code execution on the server, increasing risk. Although its usage is currently limited, Chaos RAT’s low detection profile enables espionage, data exfiltration, and persistent footholds. The malware leverages multiple techniques including privilege escalation, persistence, and command and control communications. Organizations should prioritize patching the vulnerable panel, monitor for indicators of compromise, and restrict access to administrative interfaces. Countries with significant use of Linux and Windows servers and strategic geopolitical interests are at higher risk. The threat is assessed as high severity due to its potential impact and ease of exploitation without user interaction.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 12:18:23 UTC

Technical Analysis

Chaos RAT is a remote administration tool originally released as open-source software written in Golang, first appearing in 2022. It has since evolved into a multi-platform malware used in attacks against both Linux and Windows systems. The RAT provides an administrative panel that allows threat actors to generate payloads and control infected hosts remotely. Recent versions have enhanced their configuration data encoding to evade detection and expanded their capabilities to include a wide range of post-exploitation techniques such as privilege escalation, persistence mechanisms, command execution, and data exfiltration. A critical vulnerability identified as CVE-2024-30850 exists in the web panel of Chaos RAT, enabling remote code execution on the server hosting the panel. This vulnerability allows attackers to compromise the control infrastructure itself, potentially taking over the entire botnet or malware operation. Despite limited widespread use so far, Chaos RAT’s stealthy nature and cross-platform support make it a potent tool for espionage and long-term access. The malware incorporates tactics aligned with MITRE ATT&CK techniques including T1113 (screen capture), T1543 (create or modify system process), T1547 (boot or logon autostart execution), T1489 (service stop), T1071 (application layer protocol), and others, indicating a sophisticated and modular design. The threat intelligence source is AlienVault OTX, with additional technical details and analysis available from Acronis. No known exploits in the wild have been reported yet for the CVE, but the vulnerability’s critical nature demands immediate attention.

Potential Impact

The impact of Chaos RAT on organizations worldwide can be significant due to its cross-platform nature and advanced capabilities. Successful exploitation can lead to unauthorized remote control of critical systems, enabling espionage, data theft, and disruption of operations. The remote code execution vulnerability in the administrative panel increases the risk by allowing attackers to hijack the malware’s command infrastructure, potentially expanding the scale and persistence of attacks. Organizations may face loss of confidentiality through data exfiltration, integrity violations via unauthorized system modifications, and availability issues if systems are disrupted or destroyed. The stealthy design and low detection rates make early detection difficult, increasing dwell time and damage potential. Critical infrastructure, government agencies, and enterprises with mixed OS environments are particularly vulnerable. The threat also facilitates lateral movement and persistence, enabling attackers to establish long-term footholds for further exploitation or ransomware deployment.

Mitigation Recommendations

To mitigate the risks posed by Chaos RAT, organizations should implement the following specific measures: 1) Immediately identify and patch any instances of the Chaos RAT web panel, especially addressing CVE-2024-30850 to prevent remote code execution. 2) Restrict access to administrative panels using network segmentation, VPNs, and strong authentication mechanisms such as multi-factor authentication. 3) Deploy advanced endpoint detection and response (EDR) solutions capable of detecting Golang-based malware behaviors and unusual process creations or network communications. 4) Monitor network traffic for suspicious command and control patterns consistent with Chaos RAT’s known techniques. 5) Conduct regular threat hunting focused on indicators of compromise related to Chaos RAT, including unusual privilege escalations and persistence mechanisms. 6) Harden systems by disabling unnecessary services and applying the principle of least privilege to limit malware impact. 7) Educate IT staff on the evolving capabilities of Chaos RAT and ensure incident response plans include scenarios involving RAT infections and control panel compromises. 8) Maintain up-to-date backups and test recovery procedures to mitigate potential data loss from malware activity.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.acronis.com/en-us/cyber-protection-center/posts/from-open-source-to-open-threat-tracking-chaos-rats-evolution"]
Adversary
null
Pulse Id
6842cae388c3c1ee6c4030be
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash30598ea49a58838e3bea367e89653202
hash4e0ca3bfcba634a50a4a9b60ce517557
hash64456a21c65f3ae0fbf07898124b3dc6
hash653c7a95e4d03518f8995cf05a0b4c36
hash69656a3d7555db170554fc7689fffc2b
hash88c465d1a85d4b4beeedb52c7f7dfaed
hashc8f89850cfeeada08b46a23c45c7957d
hashde3911307bfa37dcd1b8ae36a5e8472e
hashe502b8d617a2cd9bfa41762282a0ff81
hashf9ed313b6414a9a761743dc90defc59f
hashfab450261c2e3d86f6b8b005d76a9b85
hash0fb87d934e3db0123d48e2c28c33080b3ff599b8
hash213f42aae95365b1296e1aaf1c812950ada0ab7f
hash2abeae888bf0e9b2e19694e7d28c9a4b2fc9fd99
hash3403b92056d7645acfb7236824cc58b15e4d5395
hash59cf11cdd7e871893742e21f32d16e4891e87c12
hash5d53dc791c5d57412fbb2ff1cd5ea444013a4c48
hash6c9600bdd68b8dc252b7bf659f16711c7bca0b1b
hash77d09f36e05c088459594795ec530e61c4089c4c
hashe9e7c05527132d4e1386edbd5e318e00fe327090
hashec4f3a921da4b2f760ae8212d7dfa9e6f82dabc9
hashf754c503cf22b254c54c7c9f3a90c122f52dff8c
hash080f56cea7acfd9c20fc931e53ea1225eb6b00cf2f05a76943e6cf0770504c64
hash1e074d9dca6ef0edd24afb2d13ca4429def5fc5486cd4170c989ef60efd0bbb0
hash2732fc2bb7b6413c899b6ac1608818e4ee9f0e5f1d14e32c9c29982eecd50f87
hash44c54d9d0b8d4862ad7424c677a6645edb711a6d0f36d6e87d7bae7a2cb14d68
hash57f825a556330e94d12475f21c2245fa1ee15aedd61bffb55587b54e970f1aad
hash67534c144a7373cacbd8f9bd9585a2b74ddbb03c2c0721241d65c62726984a0a
hash719082b1e5c0d18cc0283e537215b53a864857ac936a0c7d3ddbaf7c7944cf79
hash773c935a13ab49cc4613b30e8d2a75f1bde3b85b0bba6303eab756d70f459693
hash77962a384d251f0aa8e3008a88f206d6cb1f7401c759c4614e3bfe865e3e985c
hash839b3a46abee1b234c4f69acd554e494c861dcc533bb79bd0d15b9855ae1bed7
hash8c0606db237cfa33fa3fb99a56072063177b61fa2c8873ed6af712bba2dc56d9
hash90c8b7f89c8a23b7a056df8fd190263ca91fe4e27bda174a9c268adbfc5c0f04
hasha364ec51aa9314f831bc498ddaf82738766ca83b51401f77dbd857ba4e32a53b
hasha51416ea472658b5530a92163e64cfa51f983dfabe3da38e0646e92fb14de191
hasha583bdf46f901364ed8e60f6aadd2b31be12a27ffccecc962872bc73a9ffd46c
hasha6307aad70195369e7ca5575f1ab81c2fd82de2fe561179e38933f9da28c4850
hashc39184aeb42616d7bf6daaddb9792549eb354076b4559e5d85392ade2e41763e
hashc8dc86afd1cd46534f4f9869efaa3b6b9b9a1efaf3c259bb87000702807f5844
hashc9694483c9fc15b2649359dfbd8322f0f6dd7a0a7da75499e03dbc4de2b23cad
hashd0a63e059ed2c921c37c83246cdf4de0c8bc462b7c1d4b4ecd23a24196be7dd7

Ip

ValueDescriptionCopy
ip176.65.141.63

Domain

ValueDescriptionCopy
domainblog.chebuya.com
domainvalhalla.nextron-systems.com

Threat ID: 6846bdb07b622a9fdf66b6fd

Added to database: 6/9/2025, 10:55:44 AM

Last enriched: 2/26/2026, 12:18:23 PM

Last updated: 3/24/2026, 7:02:34 AM

Views: 142

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses