

DarkCrystal RAT aka DCRat – Active IOCs
March 14, 2025
Fortinet Firewalls Under Attack by New LockBit-Connected Ransomware Group – Active IOCs
March 14, 2025
DarkCrystal RAT aka DCRat – Active IOCs
March 14, 2025
Fortinet Firewalls Under Attack by New LockBit-Connected Ransomware Group – Active IOCs
March 14, 2025Severity
Medium
Analysis Summary
Remcos malware has been operating since 2016. This RAT was originally promoted as genuine software for remote control of Microsoft Windows from XP onwards and is frequently found in phishing attempts due to its capacity to completely infect an afflicted machine. Remcos malware attacks Windows systems and provides the attacker complete control over the machine. It is frequently distributed by malicious documents or archive files that contain scripts or executables. Remcos, like other RATs, offers the threat actor complete access to the infected PCs which allows them to record keystrokes, passwords, and other critical information. Remcos RAT is designed to maintain persistence on the infected system, ensuring that it remains active even after the system reboots. Remcos incorporates various obfuscation and anti-debugging techniques to evade detection. The primary purpose of Remcos RAT is to facilitate data theft and espionage. Attackers can use it to steal sensitive information like login credentials, financial data, personal documents, and other confidential files.
To protect against such threats, always ensure your systems have up-to-date antivirus software, use strong and unique passwords, be cautious when opening email attachments or clicking on suspicious links, and keep your software and operating systems patched and updated.
Impact
- Data Theft
- Unauthorized Access
- Credential Theft
Indicators of Compromise
MD5
48c4c2fbee419bc8294a1b7a55a1f438
e296c22d383e4283bc790e63eab3c98c
77c0814eaf8dddac328bfbe0838eb184
d991048eb8a889fcac625b1cc39ee161
SHA-256
fa61518375428781260a99edf971bcc98b70df3e7c5d2887367393f4e206f30d
e19ec7bcc1a7e0bd92b96d4fbab1c65e650e3645611710661e5bc401242df9f5
de33e7ff04e6d11f0e69bf2db0158c6f15d243352a51f6975de56c96b676b00e
5c0b548de0dd0dd6347486f125b9a106ab4573ac56ff339174627bde37e94f64
SHA1
6e6ae139a17baf303ab047468f37f598c7070b16
2e8c3e6b64bf8b4953310352f81a41fbef95ad4d
ee9059aa7bb0b2a24d19c1f7d1aeaed00730d546
3d1b5e2429fc1beec9ce6afd49ca1116d7d883e7
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Never trust or open links and attachments received from unknown sources/senders.
- Passwords - Ensure that general security policies are employed including implementing strong passwords, correct configurations, and proper administration security policies.
- Admin Access - limit access to administrative accounts and portals to only relevant personnel and make sure they are not publicly accessible.
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable antivirus and anti-malware software and update signature definitions on time. Using multi-layered protection is necessary to secure vulnerable assets.