• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – Hidden Cobra Latest Activity
March 2, 2020
Rewterz Threat Alert – Active Scans for Apache Tomcat Ghostcat Vulnerability Detected, Patch Now
March 3, 2020

Rewterz Threat Alert – ProClient RAT with Advanced Espionage Features

March 3, 2020

Severity

High

Analysis Summary

A new campaign is found distributing the ProClient RAT that has advanced capabilities of a cyber espionage. 

rat_proclient.png

This RAT is written in .NET, and is called ProClient  (named after some namespaces present inside), with advanced features for spying and checking the victim, as well as for theft of credentials.The structure of the malware turned out to be rather simple, favoring its reverse engineering. In the sample detected, the final payload – a DLL containing ProClient – is protected by aseries of packers (including CyaX), the latter of which also has the task of executing the entry-point method by passing it the configuration.

Impact

  • Credential Theft
  • Spying
  • Unauthorized Remote Access
  • Cyber Espionage

Indicators of Compromise

Hostname

  • bc[.]iensar[.]com
  • srv1[.]cn-uinquetex[.]com

MD5

  • b139021611bbd7b5260b01ff39825e06
  • acea0de197c9dc33ead49fb3ee74c75d

SHA-256

  • ff9d6a35aeeb1207104071c683edede7ac571d515bef53b174d736ae8a2db3cf
  • 8f4a84541272fb3e27b37c5a03840e634aa4cafb6e48bd5a8540e8f40db248ce

SHA1

  • 48b32a1eb417495f27cacecc6850d8bd40f9e6c7
  • 2cb791373c7be82d0cae6190704df9a4504e2c83

Remediation

  • Block the threat indicators at their respective controls.
  • Do not download files from untrusted sources.
  • Conduct employee awareness programs against social engineering and phishing.
  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.