Summary:
Remcos is a closed-source tool that is marketed as a remote control and surveillance software by a Germany-based firm called Breaking Security. Remcos has been observed being used in malware campaigns with a wide array of functionalities.
On the Breaking Security website, Remcos or Remote Control and Surveillance tool, is marketed as a professional and legitimate tool for remotely managing Windows systems but it is now widely used in multiple malicious campaigns by threat actors. Remcos RAT is a sophisticated remote access Trojan (RAT) that can be used to fully control and monitor any Windows computer from XP and onwards. On this webpage, it provides two versions: professional edition (with all features included) and free edition (with restricted features).
Remcos RAT is recognized as a malware family because it has been abused by hackers to secretly control victims’ devices since its first version was published on July 21, 2016.
Remcos RAT is designed to be stealthy and evasive, making it difficult for antivirus software and other security measures to detect and remove it. It is typically delivered through social engineering techniques, such as phishing emails or malicious downloads.
Features / Capabilities:
Once installed on a victim's system, Remcos RAT provides the attacker with a wide range of capabilities, including:
Please refer to below images for more features/capabilities of Remcos RAT
Figure 1: Surveillance capabilities of Remcos RAT.
Figure 2: System capabilities of Remcos RAT.
Detection:
There are many articles on the internet covering how Remcos RAT can be delivered. Here in this article, I will be covering what happens when Remcos RAT is being run on the victim host and the ways attackers can use this RAT to get the system information, along with NetWitness detections covering several of it's typical activities.
Activities done by Remcos RAT during initial execution on the victim device:
Figure: Geo-location capabilities of Remcos RAT
NetWitness can detect this activity with the rule "Host traffic to external IP checker”.
NetWitness can detect this activity with "Remcos RAT Persistence registry entry".
Figure 3: Remcos RAT registry entry along with Netwitness detection.
Detecting sensitive information that, it could steal from a victim's machine.
Figure 4: Detection of the activity "Enumeration of System Information using Dxdiag"
Figure 5: Remcos RAT keylogging capabilities
With the rule “Remcos RAT keylog File Creation” Netwitness can detect this activity.
Remcos C2 Console usage Detection:
DNS Query: A specific DNS query was also detected during the installation process, specifically directed towards p4-preview.runhosting.com. Some other products from the same vendor have also been observed in this domain as well.
Figure 6
Figure 7
NetWitness Detections
After analyzing samples from various sources and referring to research articles, following are existing NetWitness Detections that aid in identifying not just Remcos RAT’s malicious activity, but other adversaries as well that might be part of similar techniques.
Application Rules (Endpoint):
boc = "Disables UAC"
boc = "Potential Windows User Account Control Bypass"
boc = "Creates Run Key"
boc = "Windows Executable Runs Command Shell"
boc = "Lists Directory Structure of a Path"
boc = "Disables UAC Remote Restrictions"
boc = "unsigned writes executable to appdatalocal directory"
boc = "Host Traffic to External IP Checker"
In addition to the existing content, we have also created new rules as mentioned above to better detect host and network activity related to Remcos RAT. All of the following are currently available from NetWitness Live. After deploying/importing these rules on to NetWitness stack, these can be seen under Investigate -> Navigate upon detecting any Remcos RAT related activity on the customer environment.
boc = "enumeration_of_sys_info_using_dxdiag" (App Rule - Endpoint)
boc = "remcos_rat_c2_console_usage_detected" (App Rule - Packet)
boc = "remcos_rat_creates_run_key" (App Rule - Endpoint)
boc = "remcos_rat_keylog_file_creation" (App Rule - Endpoint)
boc = "remcos_rat_persistence_registry_entry" (App Rule - Endpoint)
boc = "suspicious_audio_file_creation_in_temp_folders" (App Rule - Endpoint)
boc = "suspicious_image_file_creation_in_temp_folders" (App Rule - Endpoint)
[Community] Remcos RAT YARA Rules
MITRE ATT&CK Information:
Tactic |
T. ID |
Technique Name |
Activity |
Persistance |
T1547.001 |
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
Remcos can add itself to the Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run for persistence. |
Execution |
T1059.003 |
Command and Scripting Interpreter: Windows Command Shell |
Remcos can launch a remote command line to execute commands on the victim’s machine. |
T1059.006 |
Command and Scripting Interpreter: Python |
Remcos uses Python scripts. |
|
Defence Evasion |
T1112 |
Modify Registry |
Remcos has full control of the Registry, including the ability to modify it. |
T1027 |
Obfuscated Files or Information |
Remcos uses RC4 and base64 to obfuscate data, including Registry entries and file paths. |
|
T1548.002 |
Abuse Elevation Control Mechanism: Bypass User Account Control |
Remcos has a command for UAC bypassing. |
|
T1055 |
Process Injection |
Remcos has a command to hide itself through injecting into another process. |
|
Discovery |
T1083 |
File and Directory Discovery |
Remcos can search for files on the infected machine. |
T1497.001 |
Virtualization/Sandbox Evasion: System Checks |
Remcos searches for Sandboxie and VMware on the system. |
|
Collection |
T1123 |
Audio Capture |
Remcos can capture data from the system’s microphone. |
T1115 |
Clipboard Data |
Remcos steals and modifies data from the clipboard. |
|
T1056.001 |
Input Capture: Keylogging |
Remcos has a command for keylogging. |
|
T1113 |
Screen Capture |
Remcos takes automated screenshots of the infected machine. |
|
T1125 |
Video Capture |
Remcos can access a system’s webcam and take pictures. |
|
Command and Control |
T1090 |
Proxy |
Remcos uses the infected hosts as SOCKS5 proxies to allow for tunneling and proxying. |
T1105 |
Ingress Tool Transfer |
Remcos can upload and download files to and from the victim’s machine. |
Conclusion:
Remcos or Remote Control and Surveillance, marketed as a legitimate software by Germany-based Breaking Security for remotely managing Windows systems is now widely used in multiple malicious campaigns by threat actors. Remcos RAT is a sophisticated remote access Trojan (RAT) that can be used to fully control and monitor any Windows computer from XP and onwards.
Currently many threat actors are utilizing social engineering techniques to deliver this payload. It is our responsibility to prevent and detect the activities done by threat actors using Remcos RAT.
In this blog, we examined Remcos RAT and how it can be used by threat actors to gain access to victim’s host. Next, we covered its features and capabilities in detail through activities done during installation and operation, and NetWitness detections for them as well as C2 console usage detection. Finally, we listed Mitre attack framework TTP's for Remcos RAT.
References:
[1] Remcos, Software S0332 | MITRE ATT&CK
[2] The Latest Remcos RAT Driven By Phishing Campaign | FortiGuard Labs
[3] Detecting Remcos Tool Used by FIN7 with Splunk | Splunk
[4] Remcos - Splunk Security Content
[5] Remcos | Remote Control & Surveillance Software
[6] Triage
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.