Moonrise RAT: A New Low-Detection Threat with High-Cost Consequences
A new Go-based remote access trojan named Moonrise has been discovered, operating without early static detection and establishing active C2 communication before vendor alerts. The RAT supports credential theft, remote command execution, persistence, and user monitoring, enabling full remote control of infected endpoints. Its capabilities include stealing passwords, executing remote commands, uploading files, capturing screens, and accessing webcams and microphones. The malware's silent operation increases business exposure, extending dwell time and raising risks of data loss and operational disruption. The attack chain involves session registration, host environment visibility, direct system interaction, credential access, active user monitoring, and privilege manipulation. Early detection strategies involve monitoring for weak signals, rapid triage with behavior confirmation, and threat hunting to prevent repeat incidents.
AI Analysis
Technical Summary
Moonrise RAT is a sophisticated remote access trojan (RAT) developed in the Go programming language, which contributes to its cross-platform capabilities and evasion from traditional static detection methods. The malware initiates active command and control (C2) communication early in the infection lifecycle, often before security vendors can issue alerts, allowing attackers to maintain persistent and covert access to compromised systems. Its feature set includes credential theft (targeting stored passwords and authentication tokens), remote command execution, file upload/download capabilities, screen capture, and access to webcams and microphones, enabling comprehensive surveillance and control over infected endpoints. The attack chain begins with session registration and host environment reconnaissance to gather system information, followed by direct interaction with the operating system to manipulate processes and escalate privileges. Moonrise RAT also performs active user monitoring to capture sensitive data and maintain stealth. The malware’s silent operation extends dwell time, increasing the likelihood of data exfiltration, intellectual property theft, and operational disruption. Detection is challenging due to the RAT’s low signature footprint; thus, defenders must rely on monitoring subtle behavioral indicators, rapid triage to confirm suspicious activity, and continuous threat hunting to identify and mitigate infections before significant damage occurs. Indicators of compromise include specific file hashes and an IP address linked to C2 infrastructure. Although no known exploits leveraging Moonrise RAT have been observed in the wild, its capabilities and stealth make it a high-risk threat for targeted organizations.
Potential Impact
The Moonrise RAT poses a significant threat to organizations by enabling attackers to gain full remote control over infected systems, leading to extensive data breaches, credential theft, and espionage. Its ability to capture screens, record audio and video, and execute arbitrary commands can result in severe operational disruptions and loss of sensitive intellectual property. The stealthy nature of the RAT increases dwell time, allowing attackers prolonged access to networks, which can facilitate lateral movement and further compromise. Organizations may face financial losses due to remediation costs, regulatory penalties from data breaches, and reputational damage. The RAT’s credential theft capabilities can also enable attackers to escalate privileges and access additional systems, compounding the impact. Given its low detection rate and advanced persistence mechanisms, Moonrise RAT infections can be difficult to eradicate, increasing the risk of repeated incidents and long-term exposure.
Mitigation Recommendations
To effectively mitigate Moonrise RAT, organizations should implement a multi-layered defense strategy focused on early detection and rapid response. Specific recommendations include: 1) Deploy advanced endpoint detection and response (EDR) solutions capable of behavioral analysis to identify anomalous activities such as unusual process executions, privilege escalations, and unauthorized access to webcams or microphones. 2) Monitor network traffic for early-stage C2 communication patterns, including connections to known malicious IP addresses like 193.23.199.88, and implement network segmentation to limit lateral movement. 3) Conduct regular threat hunting exercises focusing on weak signals such as unexpected session registrations, host environment queries, and suspicious file uploads/downloads. 4) Enforce strict credential hygiene by implementing multi-factor authentication (MFA), regularly rotating passwords, and monitoring for credential dumping attempts. 5) Harden systems by applying the principle of least privilege and disabling unnecessary services that could be exploited for persistence. 6) Educate users about social engineering and phishing tactics that may be used to deliver the RAT. 7) Maintain comprehensive logging and enable rapid triage workflows to confirm and respond to behavioral alerts promptly. 8) Utilize threat intelligence feeds to update detection rules with indicators of compromise such as the provided file hashes. These targeted measures go beyond generic advice and address the RAT’s stealth and persistence capabilities directly.
Affected Countries
United States, United Kingdom, Germany, France, Canada, Australia, Japan, South Korea, India, Brazil, Netherlands, Singapore
Indicators of Compromise
- hash: 082fdd964976afa6f9c5d8239f74990b24df3dfa0c95329c6e9f75d33681b9f4
- hash: 7609c7ab10f9ecc08824db6e3c3fa5cbdd0dff2555276e216abe9eebfb80f59b
- hash: 8a422b8c4c6f9a183848f8d3d95ace69abb870549b593c080946eaed9e5457ad
- hash: 8d7c1bbdb6a8bf074db7fc1185ffd59af0faffb08e0eb46a373c948147787268
- hash: c7fd265b23b2255729eed688a211f8c3bd2192834c00e4959d1f17a0b697cd5e
- hash: ed5471d42bef6b32253e9c1aba49b01b8282fd096ad0957abcf1a1e27e8f7551
- ip: 193.23.199.88
Moonrise RAT: A New Low-Detection Threat with High-Cost Consequences
Description
A new Go-based remote access trojan named Moonrise has been discovered, operating without early static detection and establishing active C2 communication before vendor alerts. The RAT supports credential theft, remote command execution, persistence, and user monitoring, enabling full remote control of infected endpoints. Its capabilities include stealing passwords, executing remote commands, uploading files, capturing screens, and accessing webcams and microphones. The malware's silent operation increases business exposure, extending dwell time and raising risks of data loss and operational disruption. The attack chain involves session registration, host environment visibility, direct system interaction, credential access, active user monitoring, and privilege manipulation. Early detection strategies involve monitoring for weak signals, rapid triage with behavior confirmation, and threat hunting to prevent repeat incidents.
AI-Powered Analysis
Technical Analysis
Moonrise RAT is a sophisticated remote access trojan (RAT) developed in the Go programming language, which contributes to its cross-platform capabilities and evasion from traditional static detection methods. The malware initiates active command and control (C2) communication early in the infection lifecycle, often before security vendors can issue alerts, allowing attackers to maintain persistent and covert access to compromised systems. Its feature set includes credential theft (targeting stored passwords and authentication tokens), remote command execution, file upload/download capabilities, screen capture, and access to webcams and microphones, enabling comprehensive surveillance and control over infected endpoints. The attack chain begins with session registration and host environment reconnaissance to gather system information, followed by direct interaction with the operating system to manipulate processes and escalate privileges. Moonrise RAT also performs active user monitoring to capture sensitive data and maintain stealth. The malware’s silent operation extends dwell time, increasing the likelihood of data exfiltration, intellectual property theft, and operational disruption. Detection is challenging due to the RAT’s low signature footprint; thus, defenders must rely on monitoring subtle behavioral indicators, rapid triage to confirm suspicious activity, and continuous threat hunting to identify and mitigate infections before significant damage occurs. Indicators of compromise include specific file hashes and an IP address linked to C2 infrastructure. Although no known exploits leveraging Moonrise RAT have been observed in the wild, its capabilities and stealth make it a high-risk threat for targeted organizations.
Potential Impact
The Moonrise RAT poses a significant threat to organizations by enabling attackers to gain full remote control over infected systems, leading to extensive data breaches, credential theft, and espionage. Its ability to capture screens, record audio and video, and execute arbitrary commands can result in severe operational disruptions and loss of sensitive intellectual property. The stealthy nature of the RAT increases dwell time, allowing attackers prolonged access to networks, which can facilitate lateral movement and further compromise. Organizations may face financial losses due to remediation costs, regulatory penalties from data breaches, and reputational damage. The RAT’s credential theft capabilities can also enable attackers to escalate privileges and access additional systems, compounding the impact. Given its low detection rate and advanced persistence mechanisms, Moonrise RAT infections can be difficult to eradicate, increasing the risk of repeated incidents and long-term exposure.
Mitigation Recommendations
To effectively mitigate Moonrise RAT, organizations should implement a multi-layered defense strategy focused on early detection and rapid response. Specific recommendations include: 1) Deploy advanced endpoint detection and response (EDR) solutions capable of behavioral analysis to identify anomalous activities such as unusual process executions, privilege escalations, and unauthorized access to webcams or microphones. 2) Monitor network traffic for early-stage C2 communication patterns, including connections to known malicious IP addresses like 193.23.199.88, and implement network segmentation to limit lateral movement. 3) Conduct regular threat hunting exercises focusing on weak signals such as unexpected session registrations, host environment queries, and suspicious file uploads/downloads. 4) Enforce strict credential hygiene by implementing multi-factor authentication (MFA), regularly rotating passwords, and monitoring for credential dumping attempts. 5) Harden systems by applying the principle of least privilege and disabling unnecessary services that could be exploited for persistence. 6) Educate users about social engineering and phishing tactics that may be used to deliver the RAT. 7) Maintain comprehensive logging and enable rapid triage workflows to confirm and respond to behavioral alerts promptly. 8) Utilize threat intelligence feeds to update detection rules with indicators of compromise such as the provided file hashes. These targeted measures go beyond generic advice and address the RAT’s stealth and persistence capabilities directly.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://any.run/cybersecurity-blog/moonrise-rat-detected/"]
- Adversary
- null
- Pulse Id
- 699dd912a5b53c853ec6c4c4
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash082fdd964976afa6f9c5d8239f74990b24df3dfa0c95329c6e9f75d33681b9f4 | — | |
hash7609c7ab10f9ecc08824db6e3c3fa5cbdd0dff2555276e216abe9eebfb80f59b | — | |
hash8a422b8c4c6f9a183848f8d3d95ace69abb870549b593c080946eaed9e5457ad | — | |
hash8d7c1bbdb6a8bf074db7fc1185ffd59af0faffb08e0eb46a373c948147787268 | — | |
hashc7fd265b23b2255729eed688a211f8c3bd2192834c00e4959d1f17a0b697cd5e | — | |
hashed5471d42bef6b32253e9c1aba49b01b8282fd096ad0957abcf1a1e27e8f7551 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip193.23.199.88 | — |
Threat ID: 699e0e19be58cf853b27f359
Added to database: 2/24/2026, 8:46:17 PM
Last enriched: 2/24/2026, 8:46:40 PM
Last updated: 2/24/2026, 10:19:56 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Developer-targeting campaign using malicious Next.js repositories
MediumNorth Korean Lazarus Group Now Working With Medusa Ransomware
MediumFake Zoom meeting 'update' silently installs surveillance software
MediumMalicious OpenClaw Skills Used to Distribute Atomic MacOS Stealer
MediumFake Huorong security site infects users with ValleyRAT
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.