Rewterz Threat Advisory – CVE-2023-28069 – Dell Streaming Data Platform Vulnerability
April 7, 2023Rewterz Threat Alert – Phobos Ransomware – Active IOCs
April 7, 2023Rewterz Threat Advisory – CVE-2023-28069 – Dell Streaming Data Platform Vulnerability
April 7, 2023Rewterz Threat Alert – Phobos Ransomware – Active IOCs
April 7, 2023Severity
Medium
Analysis Summary
Remcos malware has been operating since 2016. This RAT was originally promoted as genuine software for remote control of Microsoft Windows from XP onwards, and is frequently found in phishing attempts due to its capacity to completely infect an afflicted machine. Remcos malware attacks Windows systems and provides the attacker complete control over the machine.It is frequently distributed by malicious documents or archive files that contain scripts or executables. Remcos, like other RATs, offers the threat actor complete access over the infected PCs which allow them to record keystrokes, passwords, and other critical information. Remcos incorporates various obfuscation and anti-debugging techniques to evade detection. Regular updates of its features by its creators make this malware a challenging adversary
Impact
- Information Commands
- Backdoor Theft
- Credential Theft
- User Information Thef
Indicators of Compromise
MD5
- 0e71408d394b8b78ae90813be74e3047
- 01130192806f22b1bd29e2422772fa12
- 75432ee33c929721517472be79868d9d
- bfd9a208c4e94c0b5b46c35ff6121eb5
- 288554293c54d5da83a2110619d996a5
- cd4bacd0528a0f7efdea9be27414c6e7
- 4251efb950b7a444b4f2e638bb5e586a
SHA-256
- fc2bcad21d96b3e31b27f0610209f0aa33fb1aa83504e8c346d390ac2da19504
- 50e39da793e84dc45780be3dca5aed8fa300ae2aaf7708a58da92e31865f2e81
- cb4cb300f2a793164f42208b0e799e775c80521b464c729b929f6043ad88329c
- 155ca2a0805d91f0677c262aca5016c88459874cab0ec51c1953499479989f7e
- a767b580fa20f007fcac6ef48b4fc9e7397a47c00feed0334ecfb6d118f2da9c
- e96aed97b899d7cfc37b229f045f6b87623f9abd97b15256fa6322685cb2c5f0
- b9772355669f37cc643520569eb699b6bd00e96999495404977d082b0ef4fbaf
SHA-1
- 966865cdbe92c4f5add92c7182ac5bfc1d54a03c
- f172720ad288926e3d440a6d8eb4fb302636e765
- 816897a54af148a7cc305cbbb00a165cee686eb0
- 05a33eb328e1c34b545c1fe0b11152bb1dcca37e
- 41daaaae5e15cb3480f43fb62f0d674dd51404a7
- fd92ca627cc15e4ed350478fa5aa575ef39adacf
- d13795e4016ab4c21f19ba57dac880a8e041e7bb
Remediation
- Block all threat indicators at your respective controls.
- Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Patch and upgrade any platforms and software timely and make it into a standard security policy.
- Prioritize patching known exploited vulnerabilities and zero-days. Enable antivirus and anti-malware software and update signature definitions in a timely manner. Using multi-layered protection is necessary to secure vulnerable assets.
- Do not open emails and attachments from unknown or suspicious sources.