Remcos RAT Malware Disguised as Major Carrier's Waybill
April 1, 2025, 5:27 p.m.
Description
A sophisticated malware campaign has been discovered, utilizing the Remcos RAT disguised as a shipping company waybill. The attack begins with an email containing an HTML script, which when executed, downloads a JavaScript file. This file creates and downloads several components, including a configuration file, an encoded Remcos binary, a legitimate AutoIt loader, and a malicious AutoIt script. The AutoIt script employs evasion techniques, establishes persistence, decrypts the Remcos binary, and executes shellcode. The shellcode injects Remcos into a legitimate process (RegSvcs.exe) using various API calls. The Remcos RAT, once active, can steal information and execute remote commands based on C2 instructions. The campaign demonstrates the evolving tactics of cybercriminals, emphasizing the need for caution when handling emails from unknown sources.
Tags
Date
- Created: April 1, 2025, 2:47 p.m.
- Published: April 1, 2025, 2:47 p.m.
- Modified: April 1, 2025, 5:27 p.m.
Attack Patterns
- Remcos RAT
- T1218.011
- T1059.005
- T1204.001
- T1547.001
- T1036.005
- T1566.001
- T1055
- T1140
- T1027