Rewterz Threat Advisory – CVE-2021-1397 – Cisco Integrated Management Controller Open Redirect Vulnerability
June 2, 2021Rewterz Threat Advisory – CVE-2021-30180 – Apache Dubbo Code Execution
June 2, 2021Rewterz Threat Advisory – CVE-2021-1397 – Cisco Integrated Management Controller Open Redirect Vulnerability
June 2, 2021Rewterz Threat Advisory – CVE-2021-30180 – Apache Dubbo Code Execution
June 2, 2021Severity
Medium
Analysis Summary
Remcos or Remote Control and Surveillance, marketed as a legitimate software by a Germany-based firm Breaking Security for remotely managing Windows systems is now widely used in multiple malicious campaigns by threat actors. Remcos RAT is a sophisticated remote access Trojan (RAT) that can be used to fully control and monitor any Windows computer from XP and onwards.
The current campaign utilizes social engineering techniques wherein threat actors are leveraging what’s new and trending worldwide. The phishing email contains a PDF offering CoronaVirus safety measures but in reality this PDF includes executable for a REMCOS RAT dropper that runs together with a VBS file executing the malware. The malware also adds Startup registry key at “HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce” for it to become persistent while the device affected has been restarted
.
This Backdoor gathers the following information and sends it to its servers:
- Computer Information (OS version, computer name, system type, product name, primary adapter)
- User information (user access, user profile, user name, user domain)
- Processor information (processor revision number, processor level, processor identifier, processor architecture)
Sample Spam – Coronavirus-themed-spam:
Impact
Breach of:
- Victim’s machine information (OS version, computer name, system type, product name, primary adapter).
- User information (user access, user profile, user name, user domain)
- Processor information (processor revision number, processor level, processor identifier, processor architecture)
Indicators of Compromise
MD5
- 0ba58f8044e5c1a446fc5f01afdaa284
- a61b54096cce4880f200925c86b26dd0
- 73f1d754f5b74906061d0c374a1ee1e1
- 0ba58f8044e5c1a446fc5f01afdaa284
- a61b54096cce4880f200925c86b26dd0
- 73f1d754f5b74906061d0c374a1ee1e1
SHA-256
- 70cf1ce64c7da482fc8032f12dd3f7c72ef604026f6354d9079b91a2791ef3cd
- 9603b9ed683c7af970338dcff316e78b8effa43e9d1c9fb2cf4f3ba4ff3f549a
- 5365a908b5376741bb2c016f64adf880bf2208457c6bdf2a11217a77de853e4b
- c36b77b995a3a13035670ee40e2e22ec8882cb9dc93c2284ebc1ec15740da37b
- 4a5f37d68338d5a26f92e154b0c7151808bac45ebc839a26178f55d1d8940e73
- bc856344fd92d5278bb0216cfbf5c852f3dee3daef42c39436a974f562c80814
- 3c492932d633ea366294ad1c6b29169805e50338f522265d5d8531aff6d77882
- a7d94673cc8d4e0826a9a240bd1d161b34bec3bea25c036a94df69240015469c
- 4a5f37d68338d5a26f92e154b0c7151808bac45ebc839a26178f55d1d8940e73
- bc856344fd92d5278bb0216cfbf5c852f3dee3daef42c39436a974f562c80814
- 3c492932d633ea366294ad1c6b29169805e50338f522265d5d8531aff6d77882
- a7d94673cc8d4e0826a9a240bd1d161b34bec3bea25c036a94df69240015469c
SHA1
- 5cacb316fe56c5da3c1ad0c771139960d4f0e6ec
- 65e8b468d395053082def0a5018a334f6949916e
- 6942961bab54d82a358acacf39c7ad39b00e7e23
- 5cacb316fe56c5da3c1ad0c771139960d4f0e6ec
- 65e8b468d395053082def0a5018a334f6949916e
- 6942961bab54d82a358acacf39c7ad39b00e7e23
Remediation
- Block all threat indicators at their respective controls.
- Look for IOCs in your environment.