Analysis of Remcos RAT Campaign – Part 2

Remcos RAT

In our previous analysis of Remcos RAT, we examined the XLS variant, this analysis will focus on a phishing email and a document (MS Word) infecting the victim’s computer with Remcos RAT payload. Remcos RAT, also known as Remote Control and Surveillance RAT, is a remote access Trojan (RAT) that enables attackers to take control and get unauthorised access to a victim’s computer. Malicious email attachments, software piracy downloads, and other social engineering techniques are frequently used to spread the malware.

Remcos RAT is a powerful & flexible tool that attackers can modify to meet their unique needs. It has been used in a variety of cyber attacks, including financial fraud, ransomware attacks, and espionage efforts over the last 3 years. According to observations by LMNTRIX CDC from infection data, they are collaborating with other APT organisations, including APT33 and The Gorgon Group.

 

Infection Chain

Target – Windows Platform

Infection Vector – Malspam campaign, or phishing emails

The initial vector for attacking users may vary depending on the threat actor’s motivation and targeted geography, we all know how cyber criminals perform basic reconnaissance against targets prior to attacking a range of victims with an infection vector of choice.

Sample Information

Threat Name: RemcosRAT | Category: Backdoor | Classification: Exploit

Technical Analysis of CVE-2017-11882

The Equation Editor is an exploit that refers to vulnerability in Microsoft Office’s Equation Editor component that was discovered in late 2017. The Equation Editor is a tool that allows users to insert mathematical equations into Office documents.

The vulnerability, known as CVE-2017-11882, allowed attackers to execute arbitrary code on a victim’s computer by exploiting a buffer overflow in the Equation Editor component. An attacker could exploit this vulnerability by sending a malicious RTF document containing a specially crafted Equation Editor object to a victim via phishing emails.

a) Phishing Email

Once the user opens the document, the exploit would execute at the backend, which allows the attacker to take control of the victim’s computer, steal data, and install malware. It’s very dangerous because it can infect all versions of Microsoft Office released since 2000, including Office 365.

Screenshot of Phishing Email

b) Attachment RTF Document

RTF (Rich Text Format) is a file format used for storing and exchanging formatted text documents between different word processing software. It was developed by Microsoft as a cross-platform document format that could be used by multiple software applications.

Usually, the RTF document must start out with these six characters. ie: {\rtf1 – where, 1 is the RTF version number.

RTF – CVE-2017-11882 file

As we saw many randomized numbers in the RTF document, here we need to find out the embedded Equation Editor.3 in this document.

RTF Header has the following representation

Hardcoded RTF file

Here we successfully found the hard-coded ZtIoN.3 in the document. Still using this exploit some attackers continue to use the exploit to target systems which have not been updated yet.

Dropped Payload file

Payload File Names

{{

vpviupnho[[]].[[]]exe

13d891549b770c28273dba1d0b1124130badacc1[[]].[[]]bin

Plueajsoxt[[]].[[]]exe

}}

 

Indicator of Compromise for Remcos RAT

 

Once the Remcos RAT infects your system, the following actions can be performed,

● Monitoring user activity from time to time,
● Stealing passwords and logging keystrokes,
● Establish remote desktop connections,
● Bypass traditional antivirus and endpoint products,
● Maintaining persistence on the targeted machine,
● Runs as a legitimate process by injecting into the Windows process,
● Gains admin privileges and disables user account control (UAC),
● Editing the registry and using reverse proxy.

 

MITRE ATT&CK Tactics & Techniques to detect Remcos RAT

IDTacticTechnique
TA0001Initial AccessSpearphishing Attachment
TA0002ExecutionWindows Scripting Exploitation for Client Execution
TA0003PersistenceRegistry Run Keys / Startup Folder
TA0004Privilege EscalationScheduled Task
TA0005Defense EvasionModify Registry Virtualization Evasion Technique
TA0006Credential AccessCredentials in Registry Credentials in Files Credential Dumping
TA0007DiscoverySystem Network Configuration Discovery Process Discovery File and Directory Discovery Query Registry
TA0008Lateral MovementRemote file copy
TA0009CollectionAutomated Collections Data from Local System
TA0011C&C ServerWeb Protocols Standard Application Layer Protocol Uncommonly used Ports Standard Cryptographic Protocol etc.,

Tags: No tags

Comments are closed.