• Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Press Release
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – LokiBot Malware – Active IOCs
October 28, 2021
Rewterz Threat Alert – APT Group Turla – Active IOCs
October 28, 2021

Rewterz Threat Alert – Remcos RAT – Active IOCs

October 28, 2021

Severity

High

Analysis Summary

Remcos Remote Control and Surveillance, marketed as a legitimate software by a Germany-based firm Breaking Security for remotely managing Windows systems is now widely used in multiple malicious campaigns by threat actors. Remcos RAT is a sophisticated remote access Trojan (RAT) that can be used to fully control and monitor any Windows computer from XP and onwards. The current campaign utilizes social engineering techniques wherein threat actors are leveraging what’s new and trending worldwide. The phishing email contains a PDF offering CoronaVirus safety measures but in reality, this PDF includes an executable for a REMCOS RAT dropper that runs together with a VBS file executing the malware. The malware also adds the Startup registry key at “HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce” for it to become persistent while the device affected has been restarted.
This Backdoor gathers the following information and sends it to its servers:

  • Computer Information (OS version, computer name, system type, product name, primary adapter)
  • User information (user access, user profile, user name, user domain)
  • Processor information (processor revision number, processor level, processor identifier, processor architecture),

Impact

  • Breach of: Victim’s machine information (OS version, computer name, system type, product name, primary adapter).
  • User information (user access, user profile, user name, user domain)
  • Processor information (processor revision number, processor level, processor identifier, processor architecture)

Indicators of Compromise

MD5

  • a5ebc49571041789245437d1bd7bc271
  • 3aa47d03cce06ed3c256740214112b97
  • 947b72694e25a2fefcfadd3aeec7c0a1
  • f1464e15657fd744ba707fe85eabc395
  • c97946822bc09386452975b735456654

SHA-256

  • 35d2fc15f996c73842978e40af9deafb8bf3e7791c9abfcb77c87b2d34a8bc88
  • 1732e8ccb21589249f12e9ef96a7b1676dffce0c5dff576ac4325c63fc8d62a8
  • 6449b0b19510e8c167d7bbc8a8471f81deadda1730c5889147589db21f30cd76
  • b1685b4946df16daf7ee4ecda64cc48bb48e5d0259eb0bddaca95df314de857d
  • ddf8299e0a1e35d69a3a0157d5238d754c60e6d1acc944da7345868a9fac2fa6

SHA-1

  • 8893dd029f8f278b1866f61657bd51771d44d938
  • 9fe4b5e713fb4a01507f99312d0af3ad67fafb67
  • e1263f029a1d7a673218be6ba58f8f5c53b911fb
  • fad1f241b8b26c8baab64bd5a2b0b2f763c46ae2
  • fa17f8ccd7e96ee1e05b7fa2a67f224801655417

Remediation

  • Block all threat indicators at their respective controls.
  • Search for IOCs in your environment.
  • Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.