Rewterz Threat Alert – Quasar RAT – Active IOCs
September 13, 2021Rewterz Threat Alert – WannaCry Ransomware – Active IOCs
September 13, 2021Rewterz Threat Alert – Quasar RAT – Active IOCs
September 13, 2021Rewterz Threat Alert – WannaCry Ransomware – Active IOCs
September 13, 2021Severity
High
Analysis Summary
Remcos Remote Control and Surveillance, marketed as a legitimate software by a Germany-based firm Breaking Security for remotely managing Windows systems is now widely used in multiple malicious campaigns by threat actors. Remcos RAT is a sophisticated remote access Trojan (RAT) that can be used to fully control and monitor any Windows computer from XP and onwards. The current campaign utilizes social engineering techniques wherein threat actors are leveraging what’s new and trending worldwide. The phishing email contains a PDF offering CoronaVirus safety measures but in reality, this PDF includes an executable for a REMCOS RAT dropper that runs together with a VBS file executing the malware. The malware also adds the Startup registry key at “HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce” for it to become persistent while the device affected has been restarted.
This Backdoor gathers the following information and sends it to its servers:
- Computer Information (OS version, computer name, system type, product name, primary adapter)
- User information (user access, user profile, user name, user domain)
- Processor information (processor revision number, processor level, processor identifier, processor architecture),
Impact
- Breach of: Victim’s machine information (OS version, computer name, system type, product name, primary adapter).
- User information (user access, user profile, user name, user domain)
- Processor information (processor revision number, processor level, processor identifier, processor architecture)
Indicators of Compromise
MD5
- 26467941a5c46c31d4915abd5e4a2965
- 8f43ae5b1ace9b27a4fcd4515bc6aa0e
- fb465f2b05a6fdc86eb711d7e28e7010
- e68076d03b441c9d3a049f2054d579ad
- d069ba5ab0766aedde0ae3b719f732c7
- 3340c7776156e5395e3f161c683166e4
SHA-256
- a3f8ab3315bcd827a53bf5dfe1b55f550a21e40287d15e082e364b870d6a02f8
- 5fd515aeb9488e866f1fd27d8cae68165da1c6b54bfb7628813ca26bbb25d967
- 85c6f9cc1d92580088ac090c6eeaba9169aa57290ee6568ef5278fc9170d11dc
- 57d2c7737a747ddf37dbbe16cd8a7014958574294030d9d81450c9f821d6e454
- ec5ba85945c671d1bd20949037362e87f5e9dc7e08471152b489a03adf61761c
- 921d542ca5162b83db1cb405b200618e22b6274b1e069a9ee66eaa4ced8a6caa
SHA-1
- f0c57e46d0d83e03bc166f018fbb9d819b104c3a
- 3bbf76e599161c03927327c3c284c09e3c4002b0
- 8dd1e185249be7ae7e6ab546bf4c06b59f030d4c
- 64e0cb82267d07cdcacca1258aac5eb1a86a4f04
- d1de9315f824a440873ddda6c99197f2533ff27c
- ee86d5493bb78a20a40826963c3726f3bca72023
Remediation
- Block all threat indicators at their respective controls.
- Search for IOCs in your environment.