Recent OTX pulses illuminate a diverse and high-risk threat landscape converging on enterprise infrastructure. Intelligence indicates three distinct but active campaigns:
- Commodity to RAT: Adware bundles, specifically "CloverPlus", are being used as a delivery vector for Gh0st RAT. This campaign uses obfuscated loaders to drop encrypted payloads, executing them via
rundll32.exeto establish persistence and keylogging capabilities. - RaaS Expansion: The Gentlemen RaaS operation has scaled aggressively, utilizing SystemBC proxy malware to facilitate covert C2 tunneling and lateral movement. This group is deploying multi-platform lockers targeting Windows, Linux, and ESXi environments.
- APT Supply Chain: The LightBasin (UNC1945) group continues targeting the financial sector by compromising Managed Service Providers (MSPs). They employ custom "Bring Your Own Island" tooling, including SLAPSTICK and EVILSUN, often deployed from custom VMs to exploit CVE-2020-14871 on Solaris and Linux systems.
Threat Actor / Malware Profile
Gh0st RAT (via CloverPlus)
- Distribution: Malicious adware bundles masquerading as legitimate software installers.
- Behavior: Drops encrypted payloads from resource sections; executes via
rundll32.exe. Implements DNS hijacking and keylogging. - Persistence: Registry Run keys, Windows services.
- Targeting: Broad, utilizing the "annoyance" factor of adware to hide the more dangerous RAT payload.
The Gentlemen & SystemBC
- Actor: The Gentlemen (RaaS Affiliate Program).
- Behavior: SystemBC acts as a proxy/socks5 tunnel to hide C2 traffic for Cobalt Strike beacons and ransomware payloads. Utilizes PsExec for lateral movement and AnyDesk for remote access.
- Impact: Encrypts ESXi, NAS, and BSD systems alongside standard Windows file servers.
LightBasin (UNC1945)
- Actor: State-aligned threat group targeting telecommunications and finance.
- Behavior: Leverages third-party access (MSP compromise). Uses custom Linux/Solaris implants (e.g., EVILSUN, SLAPSTICK).
- Exploits: Heavily exploits CVE-2019-0708 (BlueKeep) and CVE-2020-14871 (Oracle WebLogic).
IOC Analysis
The provided pulses contain:
- File Hashes (MD5, SHA1, SHA256): Essential for blocking on endpoints (EDR) and scanning network shares.
- CVEs (CVE-2023-27350, CVE-2019-0708, CVE-2020-14871): Critical for vulnerability management and patch prioritization.
- Operationalization: SOC teams should immediately load the SHA256 hashes into EDR allowlist/blocklist engines. The CVEs indicate the need for patch validation against the specific exploits used by LightBasin and the Gh0st loaders.
Detection Engineering
YAML
title: Potential Gh0st RAT Execution via Rundll32
id: 0e8b3c1a-1a2b-3c4d-5e6f-7a8b9c0d1e2f
description: Detects execution patterns associated with Gh0st RAT delivery via adware bundles using rundll32.exe.
status: experimental
date: 2026/04/21
author: Security Arsenal
references:
- https://otx.alienvault.com/pulse/618b4567-1234-5678-9abc-def123456789
tags:
- attack.execution
- attack.t1059.001
- attack.persistence
- attack.t1547.001
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith: '\rundll32.exe'
CommandLine|contains: '.dll'
selection_paths:
CommandLine|contains:
- '\AppData\Local\Temp\'
- '\AppData\Roaming\'
condition: selection and selection_paths
falsepositives:
- Legitimate software installers
level: high
---
title: SystemBC Proxy Malware Network Connection
id: 1f9c4d2b-2c3d-4e5f-6a7b-8c9d0e1f2a3b
description: Detects potential network connections initiated by SystemBC proxy malware often used by The Gentlemen affiliates.
status: experimental
date: 2026/04/21
author: Security Arsenal
references:
- https://otx.alienvault.com/pulse/628c5678-2345-6789-bcdf-0123456789ab
tags:
- attack.command_and_control
- attack.t1071.001
logsource:
category: network_connection
product: windows
detection:
selection:
Initiated: 'true'
Image|endswith:
- '\SystemBC.exe'
- '\svchost.exe' # Often masquerades or injects
filter_legit:
DestinationPort|notin:
- '80'
- '443'
- '8080'
condition: selection and not filter_legit
falsepositives:
- Legitimate proxy usage
level: critical
---
title: UNC1945 Exploitation Attempt CVE-2020-14871
id: 2a0d5e3c-3d4e-5f6a-7b8c-9d0e1f2a3b4c
description: Detects exploitation attempts of Oracle WebLogic Server CVE-2020-14871 associated with LightBasin/UNC1945.
status: experimental
date: 2026/04/21
author: Security Arsenal
references:
- https://otx.alienvault.com/pulse/639d6789-3456-7890-cdef-123456789abc
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
product: oracle
detection:
selection_uri:
UriPath|contains: '/console/'
selection_payload:
RequestBody|contains:
- 'T3Protocol'
- 'IIOP'
condition: all of selection_*
falsepositives:
- Rare legitimate administration
level: critical
kql
// Hunt for Gh0st RAT and The Gentlemen Indicators
// Check for specific file hashes mentioned in the pulses
DeviceProcessEvents
| where Timestamp >= ago(7d)
| where SHA256 in (
"ebba8f4342b65faccdd2a48be9f2654d3fa523360f17ff68d5498a453f76c205",
"fda9864b1aa230b60d0c736559415ac9c79e240cce411daed5da2facb9ced87c",
"cc14df781475ef0f3f2c441d03a622ea67cd86967526f8758ead6f45174db78e",
"3ab9575225e00a83a4ac2b534da5a710bdcf6eb72884944c437b5fbe5c5c9235",
"632be2363c7a13be6d5ce0dca11e387bd0a072cc962b004f0dcf3c1f78982a5a"
)
| project Timestamp, DeviceName, InitiatingProcessFileName, ProcessCommandLine, FolderPath, SHA256
| extend AlertMessage = "Suspicious process detected based on OTX Pulse IOCs"
;
// Hunt for SystemBC network patterns
DeviceNetworkEvents
| where Timestamp >= ago(7d)
| where RemotePort in (80, 443, 8080)
| where InitiatingProcessFileName =~ "cmd.exe" or InitiatingProcessFileName =~ "powershell.exe"
| where InitiatingProcessParentFileName !in ("explorer.exe", "services.exe")
| project Timestamp, DeviceName, InitiatingProcessFileName, RemoteUrl, RemoteIP, RemotePort
powershell
# Gh0st RAT & The Gentlemen Persistence Hunt
# Check Registry Run Keys for suspicious entries related to the pulses
$RunKeys = @(
"HKLM:\Software\Microsoft\Windows\CurrentVersion\Run",
"HKLM:\Software\Microsoft\Windows\CurrentVersion\RunOnce",
"HKCU:\Software\Microsoft\Windows\CurrentVersion\Run",
"HKCU:\Software\Microsoft\Windows\CurrentVersion\RunOnce"
)
$SuspiciousPatterns = @("rundll32", ".dll", "Temp", "AppData")
foreach ($Key in $RunKeys) {
if (Test-Path $Key) {
Get-ItemProperty $Key -ErrorAction SilentlyContinue |
Get-Member -MemberType NoteProperty |
Where-Object { $_.Name -ne "PSPath" -and $_.Name -ne "PSChildName" } |
ForEach-Object {
$Value = (Get-ItemProperty $Key).$_.Name
$Name = $_.Name
if ($Value -match $SuspiciousPatterns) {
Write-Host "[!] Suspicious persistence found in $Key" -ForegroundColor Red
Write-Host " Name: $Name"
Write-Host " Value: $Value"
}
}
}
}
# Check for specific IOCs on file system
$IOCPaths = @("C:\Windows\Temp\", "$env:APPDATA\", "$env:LOCALAPPDATA\Temp\")
$IOCHashes = @(
"04c3c443f6ad7582b6e61d0480594d83", # MD5 Gh0st
"44118d8fb41634b3d8d8b1c6fdf9c421" # MD5 SystemBC
)
foreach ($Path in $IOCPaths) {
if (Test-Path $Path) {
Get-ChildItem -Path $Path -Recurse -ErrorAction SilentlyContinue |
ForEach-Object {
$Hash = (Get-FileHash -Path $_.FullName -Algorithm MD5 -ErrorAction SilentlyContinue).Hash
if ($IOCHashes -contains $Hash) {
Write-Host "[!] IOC Match Found: $($_.FullName)" -ForegroundColor Yellow
}
}
}
}
# Response Priorities
* **Immediate:** Block all identified file hashes on endpoints. Hunt for `rundll32.exe` executing from user profile directories. Isolate hosts showing signs of SystemBC network activity or ESXi encryption.
* **24h:** Validate patch status for CVE-2023-27350, CVE-2019-0708, and CVE-2020-14871 across all internet-facing assets, specifically Oracle WebLogic and RDP services. Conduct credential audits for MSPs if in the financial sector.
* **1 week:** Review MSP access controls and implement strict segmentation to prevent "Island Hopping" attacks. Update adware blocklists to include CloverPlus variants.
Related Resources
Security Arsenal Incident Response Managed SOC & MDR Services AlertMonitor Threat Detection From The Dark Side Intel Hub
darkwebotx-pulsedarkweb-malwaregh0st-ratthe-gentlemensystembclightbasinransomware-as-a-service
Is your security operations ready?
Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.