Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Grafana Labs Security Breach: Hackers Accessed GitHub Code
May 17, 2026
First Public macOS M5 Kernel Exploit Developed Apple Prepared
May 17, 2026
Pwn2Own Day 2: Microsoft Exchange, Win Windows Cursor
May 16, 2026
Home/Threats/New Dual-Payload Malware Campaign: Gh0st CloverPlus Adware
Threats

New Dual-Payload Malware Campaign: Gh0st CloverPlus Adware

A new dual-payload malware campaign has emerged, prompting cybersecurity researchers to issue warnings. This campaign simultaneously deploys the Gh0st Remote Access Trojan (RAT) and CloverPlus...

Marcus Rodriguez
Marcus Rodriguez
April 20, 2026 4 Min Read
6 0

A new dual-payload malware campaign has emerged, prompting cybersecurity researchers to issue warnings. This campaign simultaneously deploys the Gh0st Remote Access Trojan (RAT) and CloverPlus Adware, creating a complex threat. As

This pairing is unusual but strategic. Gh0st RAT is a well-known tool that gives attackers full control over a compromised system, while CloverPlus adware is designed to change browser behavior, install unwanted advertising components, and generate pop-up ads for financial gain.

Together, the two threats allow the attacker to maintain a backdoor for ongoing access while also monetizing the infected machine in real time.

The campaign represents a clear shift toward multi-payload delivery strategies that maximize the return from a single infection.

Researchers at the Splunk Threat Research Team (STRT) identified this specific loader after observing its behavior across compromised hosts.

The team noted that the loader uses obfuscation techniques to hide both encrypted payloads inside its resource section, making it harder for traditional security tools to detect.

The research team mapped the malware’s full behavior against the MITRE ATT&CK framework to document every tactic and technique used during execution.

The campaign’s reach and design show that threat actors are becoming more efficient in how they deploy malware. Rather than targeting victims with a single-purpose tool, this loader delivers a package that covers both data theft and ad fraud simultaneously.

Security teams around the world are being urged to review their endpoint monitoring capabilities and update detection rules to account for this kind of bundled attack.

The impact of this campaign is significant for both individuals and organizations. The adware component can disrupt browser functionality and expose users to malicious advertisements, while the RAT payload can steal sensitive data, capture keystrokes, block access to security websites, and give attackers persistent, privileged access to the infected system.

Inside the Loader: How Both Payloads Are Dropped and Executed

The loader at the center of this campaign is built to be stealthy from the very beginning. It hides two encrypted payloads inside its resource section, and the first to be released is the CloverPlus adware module, identified as AdWare.Win32.CloverPlus.

This component is tied to an executable named wiseman.exe, as shown in Figure 01: The Adware Payload, and is responsible for modifying browser startup pages and injecting pop-up advertisements.

Once the adware is handled, the loader checks whether its own file path is located inside the system’s %temp% folder.

If it is not, it drops a copy of itself there before moving to the next step: decrypting the Gh0st RAT client module, which is stored as an encrypted resource in the RSRC section of the malware binary.

After decryption, the malware generates a random file name and saves the decoded DLL to a randomly named folder at the root of the C: drive.

The Decryption and Execution of Gh0st RAT Payload (Source - Splunk)
The Decryption and Execution of Gh0st RAT Payload (Source – Splunk)

The decrypted DLL is then launched using the legitimate Windows application rundll32.exe, as shown in Figure 03: Rundll32 Execution. This technique allows the malware to execute code under a trusted system process, reducing the chance of triggering standard security alerts.

Once active, Gh0st RAT begins gathering system information, including the machine’s MAC address and hardware drive serial number, to uniquely identify the infected host within the attacker’s command-and-control (C2) infrastructure.

To stay on the system after a reboot, Gh0st RAT uses multiple persistence methods. It writes itself to the Windows Run registry key and also registers a malicious DLL as part of the Windows Remote Access service under SYSTEMCurrentControlSetServicesRemoteAccessRouterManagersIp.

Remote Services Persistence (Source - Splunk)
Remote Services Persistence (Source – Splunk)

This gives it SYSTEM-level privileges every time the service starts, without requiring any action from the user.

Security teams should monitor for rundll32.exe loading non-standard file extensions from unusual directories. Endpoint tools should flag any process execution originating from the %temp% folder.

Registry modifications to Run keys and RemoteAccess service paths should trigger immediate alerts. Organizations should also watch for ping-based execution delays, which this malware uses to evade sandbox analysis.

DNS traffic anomalies and unexpected changes to the system hosts file can also indicate an active Gh0st RAT infection. Keeping endpoint detection rules updated and aligned with MITRE ATT&CK techniques T1134, T1033, T1070.004, T1547.001, T1021, T1543.003, T1056.001, and T1071.004 is strongly advised.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCybersecurityMalwareSecurityThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

UNC1069 Hacks Crypto Pros Using Fake Zoom North Korea-Linked

Next Post

Hackers Hijack Trusted Intel Utility via AppDomain for

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Linux Kernel Flaw: Read SSH Keys & Passwords
May 16, 2026
Google Project Zero Reveals Pixel 10 Zero- Discloses Zero-Click
May 16, 2026
Android 16 VPN Bypass Exposes User IP Lets Malicious
May 16, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us