Contact

Remcos RAT Malware Disguised as Major Carrier's Waybill

NetmanageIT OpenCTI - opencti.netmanageit.com

Remcos RAT Malware Disguised as Major Carrier's Waybill



SUMMARY :

A sophisticated malware campaign has been discovered, utilizing the Remcos RAT disguised as a shipping company waybill. The attack begins with an email containing an HTML script, which when executed, downloads a JavaScript file. This file creates and downloads several components, including a configuration file, an encoded Remcos binary, a legitimate AutoIt loader, and a malicious AutoIt script. The AutoIt script employs evasion techniques, establishes persistence, decrypts the Remcos binary, and executes shellcode. The shellcode injects Remcos into a legitimate process (RegSvcs.exe) using various API calls. The Remcos RAT, once active, can steal information and execute remote commands based on C2 instructions. The campaign demonstrates the evolving tactics of cybercriminals, emphasizing the need for caution when handling emails from unknown sources.

OPENCTI LABELS :

phishing,remcos rat,autoit,persistence techniques,shellcode injection,javascript obfuscation,email attack,waybill disguise


Open in NetmanageIT OpenCTI Public Instance with below link!


Use public read only username and password on login page.

NOTE : Use Public READ only user credentials on login page banner.


Remcos RAT Malware Disguised as Major Carrier's Waybill