HomeCyber BalkansBeware of the Weaponized Excel Document Delivering Fileless Remcos RAT

Beware of the Weaponized Excel Document Delivering Fileless Remcos RAT

Published on

spot_img

In a recent development, an advanced malware campaign has surfaced, utilizing a phishing attack to distribute a seemingly harmless Excel file that exploits the CVE-2017-0199 vulnerability. This campaign is orchestrated by cybercriminals who leverage this vulnerability in Microsoft Office to embed malicious code using OLE objects.

The attackers have employed sophisticated encryption and obfuscation techniques to conceal the malicious payload within the file. Once the victim opens the file, their system unwittingly executes a fileless variant of the Remcos Remote Access Trojan (RAT), granting the attackers remote access and control over the compromised system.

This particular malware campaign exploits the CVE-2017-0199 vulnerability to deliver the Remcos RAT through a phishing email containing an encrypted Excel file. The attack chain involves the exploitation of OLE objects, execution of HTA applications, and utilization of PowerShell commands to inject the RAT into a legitimate process. This technique has been previously exploited by various malware families, including LATENTBOT, FINSPY, and WingBird/FinFisher.

Recent campaigns in 2024 have been observed deploying a variety of malware tools such as RevengeRAT, SnakeKeylogger, GuLoader, AgentTesla, and FormBook to target sectors like Government, Manufacturing, Technology/IT, and Banking primarily in Belgium, Japan, the United States, South Korea, Canada, Germany, and Australia. These campaigns leverage spearphishing tactics to entice victims into opening deceptive Excel documents, exploiting the CVE-2017-0199 vulnerability to execute embedded OLE objects containing malicious URLs, ultimately compromising the victim’s system.

The Excel file utilizes the CVE-2017-0199 vulnerability to deliver a malicious HTA application, which triggers the execution of a PowerShell script downloading and running a VBScript from a remote URL. This initiates a chain of PowerShell processes that escalate the attack, ultimately downloading a JPEG file containing a base64-encoded ‘dnlib.dll’ library for further malicious activities.

The attack commences with PowerShell downloading a base64-encoded text file from a malicious URL, which is processed by ‘dnlib.dll’ to create a .NET assembly of Remcos RAT. The RAT is then injected into the legitimate process ‘RegAsm’, establishing persistence by injecting itself into other legitimate processes to evade traditional security defenses.

Indicators of the presence of Remcos RAT include its keylogger file and associated Indicators of Compromise (IOCs) using techniques such as T1055.001, T1027, T1543.003, and T1071.001 identified by MITRE ATT&CK.

In summary, the attackers behind this malware campaign have employed a combination of advanced techniques to create a persistent threat by exploiting the CVE-2017-0199 vulnerability in Microsoft Office. They have utilized a series of tools and scripts to maintain persistence on the infected system and potentially exfiltrate sensitive data. Organizations and individuals are advised to stay vigilant and deploy robust cybersecurity measures to defend against such sophisticated cyber threats.

Source link

Latest articles

Strengthening Cyber Resilience Through Supplier Management

 Recent data shows third-party and supply chain breaches — including software supply chain attacks...

A New Wave of Finance-Themed Scams

 The hyperconnected world has made it easier than ever for businesses and consumers...

New DroidLock malware locks Android devices and demands a ransom

 A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom...

Hamas-Linked Hackers Probe Middle Eastern Diplomats

 A cyber threat group affiliated with Hamas has been conducting espionage across the...

More like this

Strengthening Cyber Resilience Through Supplier Management

 Recent data shows third-party and supply chain breaches — including software supply chain attacks...

A New Wave of Finance-Themed Scams

 The hyperconnected world has made it easier than ever for businesses and consumers...

New DroidLock malware locks Android devices and demands a ransom

 A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom...