Two sentences: CYFIRMA uncovered a stego-campaign that weaponizes a malicious DOCX using template injection to bypass email defenses and drop Remcos RAT and Agent Tesla through a multistage, script-based they-know-what trick. The attack chain leverages VBScript, PowerShell, steganography in a JPG container, and Living Off the Land Binaries (LOLBins) like RegAsm and WinRM to achieve persistence, injection, and data theft. #RemcosRAT #AgentTesla
Keypoints
- The malicious .docx file is possibly distributed through spam or phishing emails and triggers a connection to a remote URL when opened.
- The decoy document targets a specific entity, including a reference to “General Electrics, Taiwan.”
- An RTF stage leverages CVE-2017-11882 (Equation Editor) to continue the infection chain via embedded malicious code.
- VBScript and PowerShell scripts dynamically build and execute URLs to fetch and run payloads.
- A VBScript download flows into a hidden .NET payload inside a JPG image using steganography to deploy Remcos RAT.
- Threat actors abuse Living Off the Land Binaries (LoLBins) like RegAsm and WinRm for persistence, process injection, and execution.
- The final payloads are Remcos RAT (injected into RegAsm.exe) and Agent Tesla, with C2 communications and data theft capabilities.
MITRE Techniques
- [T1566] Phishing – The malicious .docx file is possibly distributed through spam or phishing emails. Quote: ‘The malicious .docx file is possibly distributed through spam or phishing emails.’
- [T1566.001] Spear phishing Attachment – The email body masquerades as a legitimate inquiry and the attachment is delivered. Quote: ‘The malicious.docx file is attached as an attachment. This email body employs a social engineering tactic by masquerading as a legitimate inquiry regarding an order.’
- [T1204] User Execution – Opening the document initiates the attack chain. Quote: ‘Upon opening the document, a multi-stage attack is initiated, involving the download and execution of scripts and the deployment of other set of malwares.’
- [T1059.001] PowerShell – PowerShell is used in the chain to download and execute payloads. Quote: ‘The VB script, leveraging PowerShell, downloads a JPG image concealing a .NET payload encoded in base64 using steganography.’
- [T1059.005] Visual Basic – Visual Basic and PowerShell scripts are used to build and execute URLs and fetch content. Quote: ‘Visual Basic and PowerShell scripts are employed to dynamically build and execute URLs, fetch content, and execute retrieved content.’
- [T1547.001] Registry Run Keys/Startup Folder – Registry Run key updated to persist with HZA.vbs. Quote: ‘The method updates the registry key value under “SOFTWAREMicrosoftWindowsCurrentVersionRun” to reference the newly created HZA.vbs file.’
- [T1055] Process Injection – Remcos RAT is injected into RegAsm.exe for evasion. Quote: ‘Remcos RAT is injected into the legitimate “RegAsm.exe” process, demonstrating sophisticated evasion techniques.’
- [T1027] Obfuscated Files or Information – Highly obfuscated scripts/binaries are used. Quote: ‘highly obfuscated scripts and binaries.’
- [T564.003] Hidden Window – Concealed PowerShell process is used to copy and execute components. Quote: ‘a concealed PowerShell process to copy the vbs file to the designated destination.’
- [T1001.0012] Steganography – Malicious code is embedded in image files via steganography. Quote: ‘utilization of steganography, a technique involving the embedding of malicious code or malware within image files.’
- [T1071] Application Layer Protocol – C2 communications are used to download and deploy further payloads. Quote: ‘connections to a Command and Control (C2) server for the download and deployment of Agent Tesla.’
Indicators of Compromise
- [IP] context – 119.63.80.29 (originating IP in email headers), 107.173.4.15, 178.237.33.50, 45.74.19.84, and 115.251.187.194
- [Domain] context – sembe.duckdns.org
- [File Hash] MD5 File Hash – 7E9AFFFCD5105A119308BC5E1289FDA4, 65efdcbd4bc64e6e48d82bfa31f710fd, and 6 more hashes
- [Hash] SHA256 – 29325e23a684f782db14a1bf0dc56c65228e666d1f561808413a735000de3515
- [File] Filenames – Remcos RAT, HZA.txt, New1.exe (Agent Tesla), modernlover.vbs, amGOG
- [URL] http://shut.be/5f0848, http://[email protected]/5f0848, http://107.173.4.15/35005/modernlover.vbs, http://45.74.19.84/xampp/bkp/vbs_novo_new_image.jpg
- [URL] http://107.173.4.15/35005/HZA.txt, https://paste.ee/d/amGOG
- [URL] http://107.173.4.15/35005/modernlover.vbs