Rewterz Threat Advisory – ICS: Siemens SINEC NMS Vulnerabilities
March 9, 2022Rewterz Threat Advisory – Multiple Adobe Illustrator and After Effect Vulnerabilities
March 10, 2022Rewterz Threat Advisory – ICS: Siemens SINEC NMS Vulnerabilities
March 9, 2022Rewterz Threat Advisory – Multiple Adobe Illustrator and After Effect Vulnerabilities
March 10, 2022Severity
High
Analysis Summary
Remcos malware has been operating since 2016. This RAT was originally promoted as genuine software for remote control of Microsoft Windows from XP onwards, and is frequently found in phishing attempts due to its capacity to completely infect an afflicted machine. Remcos malware attacks Windows systems and provides the attacker complete control over the machine.It is frequently distributed by malicious documents or archive files that contain scripts or executables. Remcos, like other RATs, offers the threat actor complete access over the infected PCs which allow them to record keystrokes, passwords, and other critical information. Remcos incorporates various obfuscation and anti-debugging techniques to evade detection. Regular updates of its features by its creators make this malware a challenging adversary.
Impact
- Breach of: Victim’s machine information (OS version, computer name, system type, product name, primary adapter).
- User information (user access, user profile, user name, user domain)
- Processor information (processor revision number, processor level, processor identifier, processor architecture)
Indicators of Compromise
Filename
- 185rms[.]txt
- TransUnion report[.]csv
MD5
- 3b52316a763234df42003019c8a0c79f
- a2e3ff48b1adecb3efbd17e3d2041fa4
- 3b52316a763234df42003019c8a0c79f
SHA-256
- 6dc21fce65ab9cc6b368fbb7c448930e2994eb0b908bf29e6e57df37d4b467b9
- a87a19442846d4fb8777bf5dc76b0a5935ff825f464217424fcb85711093e54a
- 6dc21fce65ab9cc6b368fbb7c448930e2994eb0b908bf29e6e57df37d4b467b9
SHA-1
- aca202d5b053382a6001ef2fdb32000057a29916
- 2cc6d361f7a6a962c77d571c32106cc2396f3234
- aca202d5b053382a6001ef2fdb32000057a29916
URL
- http[:]//serverage[.]com/185[.]jpg
- http[:]//serverage[.]com/185rms[.]txt
- http[:]//nbs[.]vizzhost[.]com/drop/185rms[.]txt
- https[:]//tria[.]ge/220308-xl3sasdegn
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment.