Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      June 4, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      June 4, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      June 4, 2025

      How To Prevent WordPress SQL Injection Attacks

      June 4, 2025

      Players aren’t buying Call of Duty’s “error” excuse for the ads Activision started forcing into the game’s menus recently

      June 4, 2025

      In Sam Altman’s world, the perfect AI would be “a very tiny model with superhuman reasoning capabilities” for any context

      June 4, 2025

      Sam Altman’s ouster from OpenAI was so dramatic that it’s apparently becoming a movie — Will we finally get the full story?

      June 4, 2025

      One of Microsoft’s biggest hardware partners joins its “bold strategy, Cotton” moment over upgrading to Windows 11, suggesting everyone just buys a Copilot+ PC

      June 4, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      LatAm’s First Databricks Champion at Perficient

      June 4, 2025
      Recent

      LatAm’s First Databricks Champion at Perficient

      June 4, 2025

      Beyond AEM: How Adobe Sensei Powers the Full Enterprise Experience

      June 4, 2025

      Simplify Negative Relation Queries with Laravel’s whereDoesntHaveRelation Methods

      June 4, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Players aren’t buying Call of Duty’s “error” excuse for the ads Activision started forcing into the game’s menus recently

      June 4, 2025
      Recent

      Players aren’t buying Call of Duty’s “error” excuse for the ads Activision started forcing into the game’s menus recently

      June 4, 2025

      In Sam Altman’s world, the perfect AI would be “a very tiny model with superhuman reasoning capabilities” for any context

      June 4, 2025

      Sam Altman’s ouster from OpenAI was so dramatic that it’s apparently becoming a movie — Will we finally get the full story?

      June 4, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»South Korean Researchers Observe Remcos RAT Distributed Through Fake Shipping Lures

    South Korean Researchers Observe Remcos RAT Distributed Through Fake Shipping Lures

    June 11, 2024

    Researchers have discovered a new phishing campaign in which threat actors distribute the Remcos RAT malware within UUEncoding (UUE) file attachments in emails purporting to be about importing or exporting shipments.

    The UUEncoding (UUE) file attachments are compressed with Power Archiver, a proprietary and cross-platform archive utility that supports both Windows and MacOS.

    Use of UUEncoding (UUE) Files to Distribute Remcos RAT Malware

    Researchers from AhnLab discovered that the threat actors behind the campaign, use UUEncoding files with a .UUE extension, which are designed to encode binary data in plain text format. These file formats are suitable for attachment in e-mail or Usenet messages. The malicious .UUE files encode a VBS script attached in phishing emails. The threat actors seem to have leveraged the file format and encoding technique as an attempt to bypass detection.

    Source: asec.ahnlab.com

    When decoded, the VBS script is obfuscated, making it difficult for researchers to analyze. The script saves a PowerShell script into the %Temp% directory and executes it. The running script then downloads the Haartoppens.Eft file, which executes an additional PowerShell script. This script is also obfuscated and is designed to load a shellcode to the wab.exe process.

    Source: asec.ahnlab.com

    The shellcode maintains its persistence by adding a registry key to the infected system, and then accesses a remote C&C server to load additional instructions. The instructions ultimately download the Remcos RAT malware for execution on infected systems.

    Remcos RAT malware

    The Remcos RAT collects system information from infected systems and stores keylogging data in the %AppData% directory. The malware then sends this data to the remote command-and-control (C&C) server, which is hosted through a DuckDNS domain.

    Source: asec.ahnlab.com

    Remcos is a commercial remote access tool (RAT) that is advertised as a legitimate tool, but has been observed in numerous threat actor campaigns. Successful loading of Remcos opens a backdoor on targeted systems, allowing for complete control.

    The researchers have shared the following indicators to help detect and stop this campaign:

    IOCs (Indicators of Compromise)

    b066e5f4a0f2809924becfffa62ddd3b (Invoice_order_new.uue)
    7e6ca4b3c4d1158f5e92f55fa9742601 (Invoice_order_new.vbs)
    fd14369743f0ccd3feaacca94d29a2b1 (Talehmmedes.txt)
    eaec85388bfaa2cffbfeae5a497124f0 (mtzDpHLetMLypaaA173.bin)

    File Detection

    Downloader/VBS.Agent (2024.05.17.01)
    Data/BIN.Encoded (2024.05.24.00)

    C&C (Command & Control) Servers

    frabyst44habvous1.duckdns[.]org:2980:0
    frabyst44habvous1.duckdns[.]org:2981:1
    frabyst44habvous2.duckdns[.]org:2980:0

    The researchers also shared the following general recommendations to avoid similar phishing campaigns:

    Refrain from accessing emails from unknown sources.
    Refrain from running or enabling macro commands when accessing downloaded attachment files. Users can set programs to highest levels of security, as lower levels may automatically execute macro commands without displaying any notification.
     Update anti-malware engines to their latest versions.

    The UUE file format has previously been used in several malicious campaigns due to its ability to easily evade detection from security tools, with a researcher previously discovering a UUEncode vulnerability in the main Python program.

    Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleApple Launches ‘Private Cloud Compute’ Along with Apple Intelligence AI
    Next Article Cleveland Closes City Hall After Unspecified Cyberattack

    Related Posts

    Security

    HPE StoreOnce Faces Critical CVE-2025-37093 Vulnerability — Urges Immediate Patch Upgrade

    June 4, 2025
    Security

    The Bitter End: Unraveling Eight Years of Espionage Antics—Part One

    June 4, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    How to Build Scalable Web Apps with React JS

    Development

    Get your IT infrastructure AI-ready

    Development

    rahul900day/laravel-console-spinner

    Development

    CVE-2025-5032 – Campcodes Online Shopping Portal SQL Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    You Might Not Have A Web Performance Problem

    January 15, 2025

    Post Content Source: Read More 

    CVE-2025-37831 – Apple Soc cpufreq Null Pointer Dereference

    May 8, 2025
    Controversia sulla paternità del codice Rust per il sottosistema DRM nel kernel Linux

    Controversia sulla paternità del codice Rust per il sottosistema DRM nel kernel Linux

    April 19, 2025
    Huawei Noah’s Ark Lab Released Dream 7B: A Powerful Open Diffusion Reasoning Model with Advanced Planning and Flexible Inference Capabilities

    Huawei Noah’s Ark Lab Released Dream 7B: A Powerful Open Diffusion Reasoning Model with Advanced Planning and Flexible Inference Capabilities

    April 9, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.