

Hackers Exploit RDP to Remotely Control Browsers on Windows
January 31, 2025
Fake Google Ads Used in Malvertising Scam to Hijack Microsoft Advertising Accounts – Active IOCs
February 2, 2025
Hackers Exploit RDP to Remotely Control Browsers on Windows
January 31, 2025
Fake Google Ads Used in Malvertising Scam to Hijack Microsoft Advertising Accounts – Active IOCs
February 2, 2025Severity
Medium
Analysis Summary
Remcos malware has been operating since 2016. This RAT was originally promoted as genuine software for remote control of Microsoft Windows from XP onwards and is frequently found in phishing attempts due to its capacity to completely infect an afflicted machine. Remcos malware attacks Windows systems and provides the attacker complete control over the machine. It is frequently distributed by malicious documents or archive files that contain scripts or executables. Remcos, like other RATs, offers the threat actor complete access to the infected PCs which allows them to record keystrokes, passwords, and other critical information. Remcos RAT is designed to maintain persistence on the infected system, ensuring that it remains active even after the system reboots. Remcos incorporates various obfuscation and anti-debugging techniques to evade detection. The primary purpose of Remcos RAT is to facilitate data theft and espionage. Attackers can use it to steal sensitive information like login credentials, financial data, personal documents, and other confidential files.
To protect against such threats, always ensure your systems have up-to-date antivirus software, use strong and unique passwords, be cautious when opening email attachments or clicking on suspicious links, and keep your software and operating systems patched and updated.
Impact
- Data Theft
- Unauthorized Access
- Credential Theft
Indicators of Compromise
MD5
91646dc944a9b144775945568f2acea3
5d8dc4f7c58f4681dee4ee9f6ecc3498
6dc3b4342118b7dbf307d44149ac9f29
17ae262a19e09bb28b146e9556280af8
06e5ad39784dd0af76bb91e15e55f4d9
ecbb95df3699c9d49ba2feaaf6ed38e7
SHA-256
7a27c246967ee9e339939078beca4363d45d663aefb9c9b49fe891136b70e4ae
4fda049f94e2b9127b71cb11588cac6b379d4dddab47f6e2f028fdaaf79ad8d3
deaac86c28d7ae1c5d0890b968aeb8492af17f153318a7c2a62bb5f47ff81aae
e01213230fa8c23b9783217552dd9a51fc8bf12aefe556d637803e289d6c0418
b1687ff7e9c0d97075504c8900e1f13f8a088dd873d4adc6774e3472dbbdf7db
58f9192fb12b41531f48ccf056bee91766b8e2a329eb05354f5dbbed0342e9f2
SHA1
10b33643c23d1ed56a9702c16c030f851215fa2a
3eb23e362ecba770d842e99dd6bf386f1b6c0b47
e2ddcebfec5bd24cd65c5835ca82ede19460a627
39ad05e10fe4b48c4c107644fa796c783eb5de85
1a923cbd2dd4c06a4609e2253baf616f077e3761
8ce31da9525e24216c029b38c24ead4b7394f7ac
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Never trust or open links and attachments received from unknown sources/senders.
- Passwords - Ensure that general security policies are employed including implementing strong passwords, correct configurations, and proper administration security policies.
- Admin Access - limit access to administrative accounts and portals to only relevant personnel and make sure they are not publicly accessible.
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable antivirus and anti-malware software and update signature definitions on time. Using multi-layered protection is necessary to secure vulnerable assets.