{"id":1863,"date":"2024-09-25T07:09:18","date_gmt":"2024-09-25T07:09:18","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=1863"},"modified":"2025-07-29T02:57:41","modified_gmt":"2025-07-29T02:57:41","slug":"analysis-of-remcos-rat-campaign-part-2","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/analysis-of-remcos-rat-campaign-part-2\/","title":{"rendered":"Analysis of Remcos RAT Campaign &#8211; Part 2"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"649\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/remcos.rat_.img_-1024x649.webp\" alt=\"Remcos RAT\" class=\"wp-image-1872\"\/><\/figure>\n\n\n\n<p><strong>In our previous analysis of Remcos RAT<\/strong>, <a href=\"https:\/\/lmntrix.com\/lab\/analysis-of-remcos-rat-campaign\/\" target=\"_blank\" rel=\"noreferrer noopener\">we examined the XLS variant<\/a>, this analysis will focus on a phishing email and a document (MS Word) infecting the victim&#8217;s computer with Remcos RAT payload. Remcos RAT, also known as Remote Control and Surveillance RAT, is a&nbsp;remote access Trojan (RAT) that enables attackers to take control&nbsp;and get unauthorised access to a victim&#8217;s computer. Malicious email attachments, software piracy downloads, and other social engineering techniques are frequently used to spread the malware.<\/p>\n\n\n\n<p>Remcos RAT is a powerful&nbsp;&amp; flexible&nbsp;tool that attackers can modify to meet their unique needs. It has been used in a variety of cyber attacks, including financial fraud, ransomware attacks, and espionage efforts over the last 3 years. According to observations by LMNTRIX CDC&nbsp;from infection data, they are collaborating with other APT organisations, including APT33 and The Gorgon Group.<\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p><strong>Infection Chain<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"975\" height=\"306\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/1-27.webp\" alt=\"\" class=\"wp-image-1864\"\/><\/figure>\n\n\n\n<p><strong>Target<\/strong> &#8211; Windows Platform<\/p>\n\n\n\n<p><strong>Infection Vector<\/strong> &#8211; Malspam campaign, or phishing emails<\/p>\n\n\n\n<p>The initial vector for attacking users may vary depending on the threat actor&#8217;s motivation and targeted geography, we all know how cyber criminals perform basic reconnaissance against targets prior to attacking a range of victims with an infection vector of choice.<\/p>\n\n\n\n<p><strong>Sample Information<\/strong><\/p>\n\n\n\n<p>Threat Name: RemcosRAT | Category: Backdoor | Classification: Exploit<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"975\" height=\"227\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/2-25.webp\" alt=\"\" class=\"wp-image-1865\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Technical Analysis of CVE-2017-11882<\/strong><\/h3>\n\n\n\n<p>The Equation Editor is an exploit that refers to vulnerability in Microsoft Office&#8217;s Equation Editor component that was discovered in late 2017. The Equation Editor is a tool that allows users to insert mathematical equations into Office documents.<\/p>\n\n\n\n<p>The vulnerability, known as CVE-2017-11882, allowed attackers to execute arbitrary code on a victim&#8217;s computer by exploiting a buffer overflow in the Equation Editor component. An attacker could exploit this vulnerability by sending a malicious RTF document containing a specially crafted Equation Editor object to a victim via phishing emails.<\/p>\n\n\n\n<p><strong>a) Phishing Email<\/strong><\/p>\n\n\n\n<p>Once the user opens the document, the exploit would execute at the backend, which allows the attacker to take control of the victim&#8217;s computer, steal data, and install malware. It\u2019s very dangerous because it can infect all versions of Microsoft Office released since 2000, including Office 365.<\/p>\n\n\n<div class=\"wp-block-image is-resized\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"556\" height=\"672\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/3-25.webp\" alt=\"\" class=\"wp-image-1866\"\/><figcaption class=\"wp-element-caption\">Screenshot of Phishing Email<\/figcaption><\/figure>\n<\/div>\n\n\n<p><strong>b) Attachment RTF Document<\/strong><\/p>\n\n\n\n<p>RTF (Rich Text Format) is a file format used for storing and exchanging formatted text documents between different word processing software. It was developed by Microsoft as a cross-platform document format that could be used by multiple software applications.<\/p>\n\n\n\n<p>Usually, the RTF document must start out with these six characters. ie: {\\rtf1 &#8211; where, 1 is the RTF version number.<\/p>\n\n\n<div class=\"wp-block-image is-resized\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"669\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/4-25.webp\" alt=\"\" class=\"wp-image-1867\"\/><figcaption class=\"wp-element-caption\">RTF &#8211; CVE-2017-11882 file<\/figcaption><\/figure>\n<\/div>\n\n\n<p>As we saw many randomized numbers in the RTF document, here we need to find out the embedded Equation Editor.3 in this document.<\/p>\n\n\n\n<p><strong>RTF Header has the following representation<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"80\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/5-24.webp\" alt=\"\" class=\"wp-image-1868\"\/><\/figure>\n<\/div>\n\n\n<p><strong>Hardcoded RTF file<\/strong><\/p>\n\n\n<div class=\"wp-block-image is-resized\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"550\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/6-24.webp\" alt=\"\" class=\"wp-image-1869\"\/><\/figure>\n<\/div>\n\n\n<p>Here we successfully found the hard-coded ZtIoN.3 in the document. Still using this exploit some attackers continue to use the exploit to target systems which have not been updated yet.<\/p>\n\n\n\n<p><strong>Dropped Payload file<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"420\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/7-24.webp\" alt=\"\" class=\"wp-image-1870\"\/><\/figure>\n\n\n\n<p><strong>Payload File Names<\/strong><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>{{<\/p>\n\n\n\n<p>vpviupnho[[]].[[]]exe<\/p>\n\n\n\n<p>13d891549b770c28273dba1d0b1124130badacc1[[]].[[]]bin<\/p>\n\n\n\n<p>Plueajsoxt[[]].[[]]exe<\/p>\n\n\n\n<p>}}<\/p>\n<\/blockquote>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p><strong>Indicator of Compromise for Remcos RAT<\/strong><\/p>\n\n\n<div class=\"wp-block-image is-resized\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"517\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/8-20.webp\" alt=\"\" class=\"wp-image-1871\"\/><\/figure>\n<\/div>\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p><strong>Once the Remcos RAT infects your system, the following actions can be performed,<\/strong><\/p>\n\n\n\n<p>\u25cf Monitoring user activity from time to time,<br>\u25cf Stealing passwords and logging keystrokes,<br>\u25cf Establish remote desktop connections,<br>\u25cf Bypass traditional antivirus and endpoint products,<br>\u25cf Maintaining persistence on the targeted machine,<br>\u25cf Runs as a legitimate process by injecting into the Windows process,<br>\u25cf Gains admin privileges and disables user account control (UAC),<br>\u25cf Editing the registry and using reverse proxy.<\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p><strong>MITRE ATT&amp;CK Tactics &amp; Techniques to detect Remcos RAT<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>ID<\/td><td>Tactic<\/td><td>Technique<\/td><\/tr><tr><td>TA0001<\/td><td>Initial Access<\/td><td>Spearphishing Attachment<\/td><\/tr><tr><td>TA0002<\/td><td>Execution<\/td><td>Windows Scripting Exploitation for Client Execution<\/td><\/tr><tr><td>TA0003<\/td><td>Persistence<\/td><td>Registry Run Keys \/ Startup Folder<\/td><\/tr><tr><td>TA0004<\/td><td>Privilege Escalation<\/td><td>Scheduled Task<\/td><\/tr><tr><td>TA0005<\/td><td>Defense Evasion<\/td><td>Modify Registry Virtualization Evasion Technique<\/td><\/tr><tr><td>TA0006<\/td><td>Credential Access<\/td><td>Credentials in Registry Credentials in Files Credential Dumping<\/td><\/tr><tr><td>TA0007<\/td><td>Discovery<\/td><td>System Network Configuration Discovery Process Discovery File and Directory Discovery Query Registry<\/td><\/tr><tr><td>TA0008<\/td><td>Lateral Movement<\/td><td>Remote file copy<\/td><\/tr><tr><td>TA0009<\/td><td>Collection<\/td><td>Automated Collections Data from Local System<\/td><\/tr><tr><td>TA0011<\/td><td>C&amp;C Server<\/td><td>Web Protocols Standard Application Layer Protocol Uncommonly used Ports Standard Cryptographic Protocol etc.,<\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>In our previous analysis of Remcos RAT, we examined the XLS variant, this analysis will focus on a phishing email and a document (MS Word) infecting the victim&rsquo;s computer with Remcos RAT payload. Remcos RAT, also known as Remote Control and Surveillance RAT, is a&nbsp;remote access Trojan (RAT) that enables attackers to take control&nbsp;and get [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1872,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-1863","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1863","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=1863"}],"version-history":[{"count":3,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1863\/revisions"}],"predecessor-version":[{"id":4166,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1863\/revisions\/4166"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/1872"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=1863"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=1863"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=1863"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}