Rewterz
Rewterz Threat Alert – SNAKE Ransomware – Active IOCs
May 29, 2021
Rewterz
Rewterz Threat Alert – Nanocore Rat – Active IOCs
May 31, 2021

Rewterz Threat Alert – Remcos RAT – Active IOCs

Severity

Medium

Analysis Summary

Remcos or Remote Control and Surveillance, marketed as a legitimate software by a Germany-based firm Breaking Security for remotely managing Windows systems is now widely used in multiple malicious campaigns by threat actors. Remcos RAT is a sophisticated remote access Trojan (RAT) that can be used to fully control and monitor any Windows computer from XP and onwards.

The current campaign utilizes social engineering techniques wherein threat actors are leveraging what’s new and trending worldwide. The phishing email contains a PDF offering CoronaVirus safety measures but in reality this PDF includes executable for a REMCOS RAT dropper that runs together with a VBS file executing the malware. The malware also adds Startup registry key at “HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce” for it to become persistent while the device affected has been restarted.

This Backdoor gathers the following information and sends it to its servers:

  • Computer Information (OS version, computer name, system type, product name, primary adapter)
  • User information (user access, user profile, user name, user domain)
  • Processor information (processor revision number, processor level, processor identifier, processor architecture)

Impact

Breach of:

  • Victim’s machine information (OS version, computer name, system type, product name, primary adapter).
  • User information (user access, user profile, user name, user domain)
  • Processor information (processor revision number, processor level, processor identifier, processor architecture

Indicators of Compromise

MD5

  • 8ee20ffb5afbc5cd7c8f9483a760158f
  • 07606d78b91114b8adbbbb986fcd01c3
  • 374b63ba47b19d34072518d6e6c835c6


SHA-256

  • 3fcc17724b7e4b715fde7c1073215a1991cf6d3586d81bcd5285135ceabe8b33
  • b07811345693beb5bb27b4f03f2678219088205f4bdf15c827f5048b173be333
  • 00c13c67dcabc8708b2ef443517788825e9496b66eddc757fbe5cf6d859f34ec
  • b6b1ee1d772362d61e30816c0fe668b622064c4786af3bf2534c73e1d3dcbcb8


SHA1

  • 82e49f7aa2a304e874793ae2351214539d8e214a
  • 182aea6a290258d4ca8f1f85ce87e597809feed9
  • 13c5e571c441437006a97bee6f3ef18c9ca01cce

Remediation

  • Block all threat indicators at your respective controls.
  • Search for IOCs in your environment.