On February 11, 2026, security researchers from the ANY.RUN sandbox service reported the discovery of two potent new malware families developed in the Go programming language. The first, GREENBLOOD, is a ransomware variant optimized for speed and stealth, capable of rapid encryption and self-deletion to hinder forensic analysis. The second, Moonrise RAT, is a full-featured remote access trojan that, at the time of its discovery, was completely undetected by all antivirus engines on VirusTotal. Moonrise RAT is equipped with extensive capabilities to steal credentials, authentication tokens, and browser data. The use of Go, a cross-platform and statically-linked language, allows these threats to be packaged into a single executable that is more difficult to analyze and detect with traditional signature-based methods. This represents a growing challenge for security teams, as attackers increasingly adopt modern programming languages to bypass established defenses.
The choice of the Go language is a deliberate and strategic decision by the malware authors. Go programs are compiled into a single, static binary that includes all necessary libraries. This has several advantages for attackers:
T1027 - Obfuscated Files or Information): The large file size and unique structure of Go binaries can challenge traditional scanners and reverse engineers. It makes signature-based detection less reliable.Moonrise RAT's zero-detection status is particularly concerning. It indicates that the attackers are using modern development practices and testing their creations against public security tools to ensure evasion. Its focus on credential theft (T1555 - Credentials from Password Stores) makes it a perfect initial access tool, allowing attackers to steal legitimate credentials and then return later to move laterally or deploy secondary payloads like ransomware.
T1486 - Data Encrypted for Impact: Core function of GREENBLOOD ransomware.T1083 - File and Directory Discovery: Both malware families need to find target files or data.T1555.003 - Credentials from Web Browsers: A key feature of Moonrise RAT.T1071.001 - Web Protocols: Likely used by Moonrise RAT for C2 communication.T1027 - Obfuscated Files or Information: The use of Go itself is a form of obfuscation against traditional tools.T1485 - Data Destruction: Evidence removal capabilities of GREENBLOOD.The emergence of these tools has a significant impact on the defensive landscape:
Detecting Go-based malware requires a shift from static signatures to behavioral analysis.
Use EDR solutions that focus on detecting malicious behaviors, such as mass file encryption or credential store access, rather than relying on static signatures.
Mapped D3FEND Techniques:
Utilize OS-level credential protection mechanisms like Windows Defender Credential Guard to prevent malware from accessing secrets stored in LSASS.
Implement application allowlisting to prevent unknown and untrusted binaries, like these new Go-based threats, from executing.
Mapped D3FEND Techniques:
Maintain regular, tested, and immutable backups to ensure recovery from a ransomware attack like GREENBLOOD.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats