ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool PylangGhost

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: PylangGhost

NamesPylangGhost
CategoryMalware
TypeBackdoor
Description(Talos) As the Golang variant of the RAT is already well-documented, this blog focuses on the Python version and the similarities between the two. The initial stage consists of a command line which the fake webpage tells the unsuspecting user to copy, paste and execute.

The command line uses either PowerShell Invoke-Webrequest or curl to download a ZIP file containing the PylangGhost modules as well as Visual Basic Script file. This script is responsible for unzipping the Python library stored in the “lib.zip file” and launching the trojan by running a renamed Python interpreter using the file “nvidia.py” as the Python program to run.
Information<https://blog.talosintelligence.com/python-version-of-golangghost-rat/>

Last change to this tool card: 28 June 2025

Download this tool card in JSON format

All groups using tool PylangGhost

ChangedNameCountryObserved

APT groups

X    ↳ Subgroup: Operation Contagious InterviewNorth Korea2022-Jun 2025 HOTX

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]