Rewterz Threat Alert – APT32 Ocean Lotus – Active IOCs
August 12, 2022Rewterz Threat Update – Cisco Suffered A Cyber Attack By The Yanluowang Ransomware Gang – Active IOCs
August 12, 2022Rewterz Threat Alert – APT32 Ocean Lotus – Active IOCs
August 12, 2022Rewterz Threat Update – Cisco Suffered A Cyber Attack By The Yanluowang Ransomware Gang – Active IOCs
August 12, 2022Severity
High
Analysis Summary
Remcos malware has been operating since 2016. This RAT was originally promoted as genuine software for remote control of Microsoft Windows from XP onwards, and is frequently found in phishing attempts due to its capacity to completely infect an afflicted machine. Remcos malware attacks Windows systems and provides the attacker complete control over the machine.It is frequently distributed by malicious documents or archive files that contain scripts or executables. Remcos, like other RATs, offers the threat actor complete access over the infected PCs which allow them to record keystrokes, passwords, and other critical information. Remcos incorporates various obfuscation and anti-debugging techniques to evade detection. Regular updates of its features by its creators make this malware a challenging adversary.
Impact
- Breach of: Victim’s machine information (OS version, computer name, system type, product name, primary adapter).
- User information (user access, user profile, user name, user domain)
- Processor information (processor revision number, processor level, processor identifier, processor architecture)
Indicators of Compromise
MD5
- 3a3bfb3ab5fa0e2aa5ad155f48af983f
- 75f396338d6ee42469ca52c3452d111c
- 74b57d3af4e8455c06ae76a5f3477a7d
SHA-256
- d4a047e9050069db2d1bfba78082c935bb57b5b9f513f342da112a16805ae411
- 84e7aa86929ecd6b06c897a9bd81a6a4a46eef42a688af1696d5fedac3b97dba
- 57b23c428f334fda0c5b2ca06aa560c7834d004d5c4a60b6746c946a4d0dcdc6
SHA-1
0f6a8151de1fe379960ba564ad7a649e25742eef
c93e82a8a03815620509f6041a23f9c73640c3c8
4cd5c2df519d911923975c23c0597ac3276f485e
URL
http[:]//66[.]154[.]103[.]196/frost[.]vbs
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment.