Thanks for helping me :)
learned about apt-file and installed it right away. Now I can track suspicious files by myself in the future.
On my way to removing it I also learned that OpenSSL seems to have installed it there on purpose, for every application in need of encryption facilities to find it easily. And that's surprisingly a lot of them:
Die folgenden Pakete werden ENTFERNT:
apport* apport-gtk* apturl* bluez-cups* ca-certificates*
ca-certificates-java* certbot* cups* cups-browsed* cups-core-drivers*
cups-daemon* default-jre-headless* hplip* liblwp-protocol-https-perl*
libnet-dbus-perl* libruby3.0* libwww-perl* libxml-parser-perl*
libxml-sax-expat-perl* libxml-twig-perl* openjdk-11-jre-headless*
openshot-qt* openssl* origami-pdf* pdftk* pdftk-java*
printer-driver-gutenprint* printer-driver-hpcups* printer-driver-splix*
python3-acme* python3-apport* python3-certbot* python3-certbot-apache*
python3-certifi* python3-httplib2* python3-launchpadlib*
python3-lazr.restfulclient* python3-requests* python3-requests-toolbelt*
python3-software-properties* rake* ruby* ruby-atk* ruby-cairo*
ruby-cairo-gobject* ruby-colorize* ruby-gdk-pixbuf2* ruby-gio2* ruby-glib2*
ruby-gobject-introspection* ruby-gtk2* ruby-origami* ruby-pango*
ruby-pkg-config* ruby-rubygems* ruby3.0* rubygems-integration* snapd*
software-properties-common* software-properties-gtk* ssh-import-id*
ssl-cert* testssl.sh* **ubuntu-mate-core* ubuntu-mate-desktop***
ubuntu-release-upgrader-core* ubuntu-release-upgrader-gtk* update-manager*
update-manager-core* update-notifier* update-notifier-common* x11vnc* xorg*
xserver-xorg*
Since my laptop runs with Ubuntu Mate and my hired virtual server only runs Ubuntu, same version, this even seems to explain the difference in installations.
My conclusion: gost.so didn't get there by accident and truly serves a legitimate purpose.
Again thanks for helping me