Mirai Botnet Executes Record-Breaking 5.6 Tbps DDoS Attack Using Over 13,000 IoT Devices – Active IOCs
January 22, 2025FormBook Malware – Active IOCs
January 23, 2025Mirai Botnet Executes Record-Breaking 5.6 Tbps DDoS Attack Using Over 13,000 IoT Devices – Active IOCs
January 22, 2025FormBook Malware – Active IOCs
January 23, 2025Severity
Medium
Analysis Summary
Remcos malware has been operating since 2016. This RAT was originally promoted as genuine software for remote control of Microsoft Windows from XP onwards and is frequently found in phishing attempts due to its capacity to completely infect an afflicted machine. Remcos malware attacks Windows systems and provides the attacker complete control over the machine. It is frequently distributed by malicious documents or archive files that contain scripts or executables. Remcos, like other RATs, offers the threat actor complete access to the infected PCs which allows them to record keystrokes, passwords, and other critical information. Remcos RAT is designed to maintain persistence on the infected system, ensuring that it remains active even after the system reboots. Remcos incorporates various obfuscation and anti-debugging techniques to evade detection. The primary purpose of Remcos RAT is to facilitate data theft and espionage. Attackers can use it to steal sensitive information like login credentials, financial data, personal documents, and other confidential files.
To protect against such threats, always ensure your systems have up-to-date antivirus software, use strong and unique passwords, be cautious when opening email attachments or clicking on suspicious links, and keep your software and operating systems patched and updated.
Impact
- Data Theft
- Unauthorized Access
- Credential Theft
Indicators of Compromise
MD5
f87990c8b82e23198fcbe2052ffc056d
29b622980bc32771d8cac127961b0ba5
448478c46fe0884972f0047c26da0935
ffa97dcf51a22828bb99431db1612ee6
SHA-256
89d3609547afdd337d931199db1ba4cee7c9a294aaaaaa598a1743e87e753802
056cdf4a67164ded09385efec0912ccbb1c365c151d01b0a3633de1c4d410a18
79738b58535815ae65f86122ebd5a8bf26c6801a3238e6be5a59b77a993b60b2
6a0c462ab383be829bff00608bfa3051b0f3216802ccbcb777853fcfc0cc16f4
SHA1
474e9e95d3e12247d9b0bb1b55ac802ab1cbf031
895a13abd7ef4f8e0ea9cc1526350eccf1934b27
9c98d2c02b1bb2e16ac9f0a64b740edf9f807b23
b27a2713092a8b8f51eeb0b05752914091f3a5f9
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Never trust or open links and attachments received from unknown sources/senders.
- Passwords - Ensure that general security policies are employed including implementing strong passwords, correct configurations, and proper administration security policies.
- Admin Access - limit access to administrative accounts and portals to only relevant personnel and make sure they are not publicly accessible.
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable antivirus and anti-malware software and update signature definitions on time. Using multi-layered protection is necessary to secure vulnerable assets.