Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

From open-source to open threat: Tracking Chaos RAT’s evolution

0
Medium
Published: Fri Jun 06 2025 (06/06/2025, 11:02:59 UTC)
Source: AlienVault OTX General

Description

Chaos RAT is an open-source remote administration tool written in Golang that has evolved since 2022 to support both Linux and Windows platforms. A critical vulnerability identified as CVE-2024-30850 exists in its web control panel, allowing remote code execution on the server. Although currently limited in usage, Chaos RAT's low detection profile enables threat actors to perform espionage, data exfiltration, and maintain persistent access. The malware employs multiple techniques including privilege escalation, persistence, and command and control communications. Organizations should prioritize patching the vulnerable control panel, restrict access to administrative interfaces, and monitor for indicators of compromise. The threat is assessed as high severity due to its potential impact and ease of exploitation without user interaction. Patch status is not confirmed; no official fix or patch links are provided. The affected platforms include Linux and Windows systems. No specific countries are identified as targeted, but those with significant Linux and Windows server use and strategic geopolitical interests may be at higher risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/04/2026, 05:52:16 UTC

Technical Analysis

Chaos RAT is a cross-platform remote administration tool written in Golang that has evolved since 2022 to support Linux and Windows. It is exploited by threat actors to control compromised systems via a web-based administrative panel. A critical remote code execution vulnerability (CVE-2024-30850) exists in this web control panel, increasing risk of unauthorized server control. The malware uses various techniques such as privilege escalation, persistence, and command and control communications to maintain access and evade detection. Despite limited current usage, its low detection profile facilitates espionage and data exfiltration. No official patch or remediation details are provided, and the vendor advisory or patch status is not confirmed. Organizations are advised to restrict access to the administrative interface and monitor for compromise.

Potential Impact

The critical remote code execution vulnerability in Chaos RAT's web control panel allows attackers to execute arbitrary code on the server hosting the panel. This can lead to full system compromise, enabling espionage, data exfiltration, and persistent unauthorized access. The malware's cross-platform nature and use of multiple evasion and persistence techniques increase the risk and potential impact. Although usage is currently limited and no known exploits in the wild are reported, the ease of exploitation without user interaction elevates the threat level.

Mitigation Recommendations

Patch status is not yet confirmed—check the vendor advisory for current remediation guidance. Organizations should restrict access to the Chaos RAT web control panel administrative interfaces to trusted users only. Monitoring for indicators of compromise related to Chaos RAT activity is recommended. Prioritize patching the vulnerable control panel once an official fix is available. Until then, limit exposure by network segmentation or access controls to reduce risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.acronis.com/en-us/cyber-protection-center/posts/from-open-source-to-open-threat-tracking-chaos-rats-evolution"]
Adversary
null
Pulse Id
6842cae388c3c1ee6c4030be
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash30598ea49a58838e3bea367e89653202
hash4e0ca3bfcba634a50a4a9b60ce517557
hash64456a21c65f3ae0fbf07898124b3dc6
hash653c7a95e4d03518f8995cf05a0b4c36
hash69656a3d7555db170554fc7689fffc2b
hash88c465d1a85d4b4beeedb52c7f7dfaed
hashc8f89850cfeeada08b46a23c45c7957d
hashde3911307bfa37dcd1b8ae36a5e8472e
hashe502b8d617a2cd9bfa41762282a0ff81
hashf9ed313b6414a9a761743dc90defc59f
hashfab450261c2e3d86f6b8b005d76a9b85
hash0fb87d934e3db0123d48e2c28c33080b3ff599b8
hash213f42aae95365b1296e1aaf1c812950ada0ab7f
hash2abeae888bf0e9b2e19694e7d28c9a4b2fc9fd99
hash3403b92056d7645acfb7236824cc58b15e4d5395
hash59cf11cdd7e871893742e21f32d16e4891e87c12
hash5d53dc791c5d57412fbb2ff1cd5ea444013a4c48
hash6c9600bdd68b8dc252b7bf659f16711c7bca0b1b
hash77d09f36e05c088459594795ec530e61c4089c4c
hashe9e7c05527132d4e1386edbd5e318e00fe327090
hashec4f3a921da4b2f760ae8212d7dfa9e6f82dabc9
hashf754c503cf22b254c54c7c9f3a90c122f52dff8c
hash080f56cea7acfd9c20fc931e53ea1225eb6b00cf2f05a76943e6cf0770504c64
hash1e074d9dca6ef0edd24afb2d13ca4429def5fc5486cd4170c989ef60efd0bbb0
hash2732fc2bb7b6413c899b6ac1608818e4ee9f0e5f1d14e32c9c29982eecd50f87
hash44c54d9d0b8d4862ad7424c677a6645edb711a6d0f36d6e87d7bae7a2cb14d68
hash57f825a556330e94d12475f21c2245fa1ee15aedd61bffb55587b54e970f1aad
hash67534c144a7373cacbd8f9bd9585a2b74ddbb03c2c0721241d65c62726984a0a
hash719082b1e5c0d18cc0283e537215b53a864857ac936a0c7d3ddbaf7c7944cf79
hash773c935a13ab49cc4613b30e8d2a75f1bde3b85b0bba6303eab756d70f459693
hash77962a384d251f0aa8e3008a88f206d6cb1f7401c759c4614e3bfe865e3e985c
hash839b3a46abee1b234c4f69acd554e494c861dcc533bb79bd0d15b9855ae1bed7
hash8c0606db237cfa33fa3fb99a56072063177b61fa2c8873ed6af712bba2dc56d9
hash90c8b7f89c8a23b7a056df8fd190263ca91fe4e27bda174a9c268adbfc5c0f04
hasha364ec51aa9314f831bc498ddaf82738766ca83b51401f77dbd857ba4e32a53b
hasha51416ea472658b5530a92163e64cfa51f983dfabe3da38e0646e92fb14de191
hasha583bdf46f901364ed8e60f6aadd2b31be12a27ffccecc962872bc73a9ffd46c
hasha6307aad70195369e7ca5575f1ab81c2fd82de2fe561179e38933f9da28c4850
hashc39184aeb42616d7bf6daaddb9792549eb354076b4559e5d85392ade2e41763e
hashc8dc86afd1cd46534f4f9869efaa3b6b9b9a1efaf3c259bb87000702807f5844
hashc9694483c9fc15b2649359dfbd8322f0f6dd7a0a7da75499e03dbc4de2b23cad
hashd0a63e059ed2c921c37c83246cdf4de0c8bc462b7c1d4b4ecd23a24196be7dd7

Ip

ValueDescriptionCopy
ip176.65.141.63

Domain

ValueDescriptionCopy
domainblog.chebuya.com
domainvalhalla.nextron-systems.com

Threat ID: 6846bdb07b622a9fdf66b6fd

Added to database: 6/9/2025, 10:55:44 AM

Last enriched: 4/4/2026, 5:52:16 AM

Last updated: 5/9/2026, 10:23:40 AM

Views: 167

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses