Rewterz Threat Advisory – Multiple NVIDIA Jetson Chipsets Vulnerabilities
June 23, 2021Rewterz Threat Advisory – CVE-2021-27274 – Netgear ProSAFE Network Management System Arbitrary File Upload
June 23, 2021Rewterz Threat Advisory – Multiple NVIDIA Jetson Chipsets Vulnerabilities
June 23, 2021Rewterz Threat Advisory – CVE-2021-27274 – Netgear ProSAFE Network Management System Arbitrary File Upload
June 23, 2021Severity
Medium
Analysis Summary
Remcos or Remote Control and Surveillance, marketed as a legitimate software by a Germany-based firm Breaking Security for remotely managing Windows systems are now widely used in multiple malicious campaigns by threat actors. Remcos RAT is a sophisticated remote access Trojan (RAT) that can be used to fully control and monitor any Windows computer from XP and onwards.
The current campaign utilizes Spam Email techniques wherein threat actors are leveraging what’s new and trending worldwide. The phishing email contains a PDF offering CoronaVirus safety measures but in reality, this PDF includes an executable for a REMCOS RAT dropper that runs together with a VBS file executing the malware. The malware also adds Startup registry key at “HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce” for it to become persistent while the device affected has been restarted
This Backdoor gathers the following information and sends it to its servers:
- Computer Information (OS version, computer name, system type, product name, primary adapter)
- User information (user access, user profile, user name, user domain)
- Processor information (processor revision number, processor level, processor identifier, processor architecture)
Impact
Breach of:
- Victim’s machine information (OS version, computer name, system type, product name, primary adapter).
- User information (user access, user profile, user name, user domain)
- Processor information (processor revision number, processor level, processor identifier, processor architecture)
Indicators of Compromise
MD5
- f4b8568b64c48cd42c52f825bbfd6104
- 0a18354ef4ec26659e704a0dcad48d9f
SHA-256
- 9882dda58a91a1e4ab56d6d3f7311ebd31d6bf8ad674484819110da1af0d0192
- fecfb1e3c47c27decb3ddd8528d99c97a63e39d5
SHA1
- f7c87a2f1f087483d326a99163961235f7e6a894
- 34540a51780e487ff9426db2ea9e2ed985e6c46130439de2e434b4a804446566
- 9023ba925a9192e5fbfab4fe7ffef03032f6eeb9444fe7a133acf196e6dbdacd
- ee02c20cfc11d6ac2a99f30f8fa942aed3d306ee933fd9c32ed4c2fcaba076b5
- 7f81d19eac7f3c9c34abe80a95b1b5516bb86bc225f4bc60488dfcfefdf3a9ea
- 452a1cd5124c5e378a82d407ed9318f0a6bba970e53c2562a99f67d11fd0c467
- 743626c6e25218f899f4cc7d9d0729dab43bd3a809d75d7dd57727600dcd2647
- c9626978ab76325e8142c9d077ae55d23609b37a11851f73172360e27ae93496
- 8597e9d366c44c4a65594f54afbe9e0a182497d7cc76289ec79fe128add5624a
- 291643b5acba1a819ff6bbafb7e49ce75ebf14e61a0f0ab1d058c43d64ca77e7
- c31689a0a23ce8a3255729cb711fbc5b8c9fe1f20ffd01a1fa8d6aa978858978
- 24aaeed318227a6e1ca20080d3c7c1a7b4c3c4711a0964a3a45b506d7e2692f4
Remediation
- Block all threat indicators at their respective controls.
- Search for IOCs in your environment.