Rewterz
Rewterz Threat Alert – Microsoft Alerts on SEO Poisoning Campaign – Active IOCs
June 15, 2021
Rewterz
Rewterz Threat Alert – SmokeLoader Malware – Active IOCs
June 15, 2021

Rewterz Threat Alert – Remcos RAT – Active IOCs

Severity

Medium

Analysis Summary

Remcos or Remote Control and Surveillance, marketed as a legitimate software by a Germany-based firm Breaking Security for remotely managing Windows systems are now widely used in multiple malicious campaigns by threat actors. Remcos RAT is a sophisticated remote access Trojan (RAT) that can be used to fully control and monitor any Windows computer from XP and onwards.

The current campaign utilizes Spam Email techniques wherein threat actors are leveraging what’s new and trending worldwide. The phishing email contains a PDF offering CoronaVirus safety measures but in reality, this PDF includes an executable for a REMCOS RAT dropper that runs together with a VBS file executing the malware. The malware also adds Startup registry key at “HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce” for it to become persistent while the device affected has been restarted

This Backdoor gathers the following information and sends it to its servers:

  • Computer Information (OS version, computer name, system type, product name, primary adapter)
  • User information (user access, user profile, user name, user domain)
  • Processor information (processor revision number, processor level, processor identifier, processor architecture)

Impact

Breach of:

  • Victim’s machine information (OS version, computer name, system type, product name, primary adapter). 
  • User information (user access, user profile, user name, user domain) 
  • Processor information (processor revision number, processor level, processor identifier, processor architecture)

Indicators of Compromise

MD5

  • 03c31e45cda3afb1aa217181678450fa
  • 1c94c62c06906aa2bf5ae8b0f831678c
  • 9f43dc6c150ba3f66ef6ac84e41a4fd2

SHA-256

  • 089ff6100c1acf1feed320c00bc73d3b9f582e4e7415e00789d45f1bdb9c58b2
  • 06960267e82053a5b83e48c13785bf27974e73fb07d09fdbfe3aae2c029db427
  • da8122669b56c0c052e0abb3563eb694e1dacf721a04032d2a4b4585e5bbfcb1
  • e0ec686c3b538f8c981cda3ed2ce13121e1f6b0c9ea73f1dd1ad8606bc9b5a27
  • 3c56c4a0149a7f46a2a456d3ec7bd4515574a3f0fa2c4e3a489f08ca589c1679
  • aafe9e6368558fe7cf16b19ba3579678cb4fbed684f7ef62fa63f61cbff3b896
  • 395ea77881b7620cf23761327b50c77059efa7eb69d06792fb2114f5bf055cf4
  • e21074c6d7798d209bc3c71c7c1729c34771e469eb2d5098586372445d1096e9
  • 755d1705b3e251b03d2dede382eab3891eeab12db5550846a63dac632cdf04a7
  • 4f7dfbaf44dbaa986ab19e625d3e1d21074db4a0da046512093fa077a62b0d20
  • 9d24c0ba8899a24c152255498c282a41fa8734449322a5aa450afacccb010b5d
  • 0782ce78c463b3c1026faa7b2a25d63681d78f4c03c4c085fda9836a56c8936b
  • bda618c25e614eda32187ac62dea66112c17009c84683e2551750bc6ce0a9a07
  • 0928419ada300d8aaa0b84b2597580e9bbccb7f9b9cf85ff112fd97bf63ac0c5
  • 447527b691c190d23a9e21f03a6cecc5dae1167b36d9f30fc8f3aa996d2514ac
  • 425f2a86055e0a808cb44ed3f6e33b2b90a86c9ba937e74eb0469e06939b1b98
  • f362d72dfa134dc22f857bd942295b66980fb940c0451e9b3e7cbf1fc1ea21f7
  • 1be66107019df9b350ac7929f5a6ee8c07b2cfd5a361a7d2939fe85f092cf5cd
  • 1da8ec80cabd3247d695dffc882722639ebe55e45728ecf331aa92acb09de3e0
  • 46d31e9ff4c8e25f9384da64007e4c8a3d36522e3b0f2ea2a1c6182e4cdf4bc8

SHA1

  • 26a7edf731f612d8ad771334bf544bfde5199079
  • 56cd80a5a30de46255747f26d52a3e684e2f40c2
  • fc38386f3c718f8c4515c2c3252ef9bc7fbe8629

Remediation

  • Block all threat indicators at their respective controls.
  • Look for IOCs in your environment.