Check Point researchers uncovered a large-scale phishing campaign in Colombia targeting 40+ firms to covertly plant the Remcos RAT. The attackers use heavily obfuscated archives, PowerShell, and memory-only loading (via reflective loading with LoadPE) to gain full control while evading defenses. #Remcos #LoadPE #ReflectiveLoading #AmsiBypass #Unhooking #Colombia
Keypoints
- Targeted a broad set of Colombian companies across multiple industries.
- Primary objective: install Remcos malware for full remote control and data access.
- Phishing emails included archives (ZIP/RAR/TGZ) with enticing content to lure recipients.
- The archive carries a highly obfuscated BAT file that launches heavily obfuscated PowerShell commands.
- Two .NET modules operate in memory: one for evasion/unhooking and one for loading Remcos via reflective loading (LoadPE).
- Remcos is loaded in memory (reflective loading) to avoid disk presence and detection.
- Defensive evasion includes unhooking kernel32.dll/ntdll.dll and patching AMSI/EtwEventWrite to return errors.
MITRE Techniques
- [T1566.001] Phishing – Spearphishing Attachment – “The phishing email contains an attachment that appears to be a harmless archive file, such as ZIP, RAR or TGZ.”
- [T1027] Obfuscated/Compressed Files and Information – “The archive file contains a highly obfuscated Batch (BAT) file. Upon execution, the BAT file runs PowerShell commands which are also heavily obfuscated.”
- [T1059.001] PowerShell – “the BAT file runs PowerShell commands which are also heavily obfuscated.”
- [T1620] Reflective Code Loading – “reflective loading…LoadPE…Remcos malware directly into memory…without the need for it to be stored on the disk.”
- [T1562.001] Impair Defenses – “Unhooking any security mechanisms present… patching the amsi.dll AmsiScanBuffer function to return ‘The parameter is incorrect’ code (0x80070057) and patching EtwEventWrite.”
Indicators of Compromise
- [IP Address] C2 channel – 192.161.184.21
- [SHA-1] BAT IOC – dbc8cd0d565c9fa45a0f0ce030f609cfbc8dcc49, 747c2466b4f4b5024f321a07fca597824d2483f8 and 2 more hashes
- [SHA-1] BAT IOC – 3903cd20c6e72582f0ce3457a8964c6d9bc7496d and 2 more hashes
- [SHA-1] BAT IOC – 091a54d15376e86860ed52f3dcb5d3ded457e669 and 2 more hashes
- [SHA-1] RAR IOC – ef1cc1750f5f580aa9338b8c5c5125cfd8406f7b and 2 more hashes
- [SHA-1] RAR IOC – 06c4ae8f298943340466a5dd1a6d44491349dc89 and 2 more hashes