Rewterz
Rewterz Threat Alert – Trickbot Malware- Active IOCs
July 14, 2021
Rewterz
Rewterz Threat Alert – FormBook Malware – Active IOCs
July 14, 2021

Rewterz Threat Alert – Remcos RAT – Active IOCs

Severity

High

Analysis Summary

Remcos Remote Control and Surveillance, marketed as a legitimate software by a Germany-based firm Breaking Security for remotely managing Windows systems is now widely used in multiple malicious campaigns by threat actors. Remcos RAT is a sophisticated remote access Trojan (RAT) that can be used to fully control and monitor any Windows computer from XP and onwards. The current campaign utilizes social engineering techniques wherein threat actors are leveraging what’s new and trending worldwide. The phishing email contains a PDF offering CoronaVirus safety measures but in reality, this PDF includes an executable for a REMCOS RAT dropper that runs together with a VBS file executing the malware. The malware also adds 
Startup registry key at “HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce” for it to become persistent while the device affected has been restarted. 

This Backdoor gathers the following information and sends it to its servers: 
 

  • Computer Information (OS version, computer name, system type, product name, primary adapter)
  • User information (user access, user profile, user name, user domain)
  • Processor information (processor revision number, processor level, processor identifier, processor architecture),

Impact

  • Information theft and espionage
  • Credential Theft
  • Unauthorized Access

Indicators of Compromise

MD5

  • f5976262663665f024c87471ce85a068
  • e8a814e8d2062c472ee382ea40c2c6a4
  • 6797b19e6f2f174103c00f1fe84b3016
  • fd23c46b82e1c901cf035a49839d158c
  • be91790fb1d2f8106dffc2921e49ad8b

SHA-256

  • 95d7c99af4ea07ed847623e0cb78145ac3e462b8fc294a62258d84cae3fe8af1
  • cbe42b277b9e2d8ad915917a6c9a6cca9858efb70c342462a0a6701b39dda1fc
  • 20abe25c4f02f73cdda3e8e74187202fbdbf5fa2fd7fe92b2d1ab328b66c1950
  • 3c3a2c8d39c0dbf9ffcd0867aebc64b132c8c1b833b8a54e2aa36ecf9cb797d2
  • 24da17bf8dead78b5f245b625b133db011513eec8d0c57c770787543786f4c9b

SHA-1

  • 80f13476ee9f711f3ac9ada6720127b8851f2e19
  • 97262314932027eb62e8f31e25197e0214362415
  • 86db4e27becc779ddf5769ff861cadf72bca6a1c
  • fcf71d291f7a1f3a5e1d652f3ee7b281bf52bdf3
  • 2f545cb0ee74a07194e600557e2cea84bb95da9b

Remediation

  • Block all threat indicators at their respective controls.
  • Search for IOCs in your environment