McAfee Labs has identified a significant rise in the Remcos RAT threat in Q3 2024.
The malware is often delivered through phishing emails and malicious attachments, allowing cybercriminals to remotely control infected machines and compromising sensitive data.
In a technical analysis of two Remcos RAT variants, highly obfuscated PowerShell scripts are executed to download and inject multiple files into a legitimate Microsoft .NET executable, eventually leading to the installation of the Remcos payload.
In variant 2, the Remcos RAT comes from an Office Open XML document, which is downloaded from a spam email attachment and imported using the CVE-2017-11882 Equation Editor vulnerability.
The VBS script from variant 2, which is highly obfuscated, launches PowerShell using Base64 encoded strings as the command.
Once the assembly “dnlib.dll” is loaded, it calls a method VAI from a type dnlib.IO.Home within the loaded assembly.
Organizations can better protect their systems and sensitive data from Remcos RAT by implementing robust defenses such as regular software updates, email filtering, and network monitoring.
By staying vigilant and informed about emerging threats like Remcos RAT, organizations can safeguard against future cyberattacks.
IOCs and detections for each variant are also provided in the article.
References to the original source of the article are given at the end of the blog post.