

Remcos RAT – Active IOCs
March 7, 2025
CVE-2024-51476 – IBM Concert Software Vulnerability
March 7, 2025
Remcos RAT – Active IOCs
March 7, 2025
CVE-2024-51476 – IBM Concert Software Vulnerability
March 7, 2025Severity
High
Analysis Summary
MassLogger, a .NET credential stealer, is a keylogger and stealer malware. MassLogger's prime objective is data extraction or information theft, such as bank account and/or credit card details. This malware was published in April 2020 and was offered for a moderate price on underground forums with a few license choices. It starts with a launcher that employs rudimentary anti-debugging techniques that may be readily bypassed if detected. Eventually, the first stage loader XOR decrypts the second stage assembly, which then decrypts, loads, and executes the final MassLogger payload.
MassLogger targets a wide range of apps to steal login credentials and other sensitive information. It obtains and exfiltrates user credentials from a variety of sources, including Microsoft Outlook, Google Chrome, Mozilla Firefox, and instant messengers.
Impact
- Financial Theft
- Information Theft
Indicators of Compromise
MD5
751052d6c7b099d4bbf56c225b86ac0b
026760fb65d01ed810dd5195eb848499
1922808e35850a35ea5717bd17a9609a
ef311870dd6d231258ee7084b75cfaf6
SHA-256
6771cb2cd76d2ce3cf81ee1defd8a2649fbd029c22a2d41412d3747211549724
c294f4ea03dbbc49bdbec757d718ac1f7cd8015e197ec956416a07debac69ec9
29b776fc13b4df03fe9f5eb21640a50a9b988f372b447dc75a165f2b5197a86e
0d0c947d97036bcc46f7527e5a3953889c2ff2de32d503e463fbfa19d035716d
SHA1
a8844bcc138200a8f88ce76e4dec400588d287d4
786327727862a62043c979761b749a55818abb3c
23eb0a5e5aa174a5e22db6bbfb8672fba077c93a
5fd5b0c5d5720be189c3db1c8d548d8c43b630f4
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Never trust or open " links and attachments received from unknown sources/senders.
- Ensure that general security policies are employed including implementing strong passwords, correct configurations, and proper administration security policies.
- Limit access to administrative accounts and portals to only relevant personnel and make sure they are not publicly accessible.
- Patch and upgrade any platforms and software on time and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable antivirus and anti-malware software and update signature definitions on time. Using multi-layered protection is necessary to secure vulnerable assets.