RULE(RULE ID:714970)

Rule General Information
Release Date: 2016-07-01
Rule Name: Gh0st RAT Variant (Ghost Dragon APT) Checkin Response
Severity:
CVE ID:
Rule Protection Details
Description: A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software.Trojans can be employed by cyber-thieves and hackers trying to gain access to users' system.
Impact: Trojans may allow an attacker to access users' personal information such as banking information, passwords, or personal identity.
Affected OS: Windows, Linux, Others
Reference: blog.cylance.com/the-ghost-dragon
Solutions
Search and kill the malware by using antivirus tools and repair the system vulnerabilities.