Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      June 2, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      June 2, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      June 2, 2025

      How To Prevent WordPress SQL Injection Attacks

      June 2, 2025

      How Red Hat just quietly, radically transformed enterprise server Linux

      June 2, 2025

      OpenAI wants ChatGPT to be your ‘super assistant’ – what that means

      June 2, 2025

      The best Linux VPNs of 2025: Expert tested and reviewed

      June 2, 2025

      One of my favorite gaming PCs is 60% off right now

      June 2, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      `document.currentScript` is more useful than I thought.

      June 2, 2025
      Recent

      `document.currentScript` is more useful than I thought.

      June 2, 2025

      Adobe Sensei and GenAI in Practice for Enterprise CMS

      June 2, 2025

      Over The Air Updates for React Native Apps

      June 2, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      You can now open ChatGPT on Windows 11 with Win+C (if you change the Settings)

      June 2, 2025
      Recent

      You can now open ChatGPT on Windows 11 with Win+C (if you change the Settings)

      June 2, 2025

      Microsoft says Copilot can use location to change Outlook’s UI on Android

      June 2, 2025

      TempoMail — Command Line Temporary Email in Linux

      June 2, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»South Korean Researchers Observe Remcos RAT Distributed Through Fake Shipping Lures

    South Korean Researchers Observe Remcos RAT Distributed Through Fake Shipping Lures

    June 11, 2024

    Researchers have discovered a new phishing campaign in which threat actors distribute the Remcos RAT malware within UUEncoding (UUE) file attachments in emails purporting to be about importing or exporting shipments.

    The UUEncoding (UUE) file attachments are compressed with Power Archiver, a proprietary and cross-platform archive utility that supports both Windows and MacOS.

    Use of UUEncoding (UUE) Files to Distribute Remcos RAT Malware

    Researchers from AhnLab discovered that the threat actors behind the campaign, use UUEncoding files with a .UUE extension, which are designed to encode binary data in plain text format. These file formats are suitable for attachment in e-mail or Usenet messages. The malicious .UUE files encode a VBS script attached in phishing emails. The threat actors seem to have leveraged the file format and encoding technique as an attempt to bypass detection.

    Source: asec.ahnlab.com

    When decoded, the VBS script is obfuscated, making it difficult for researchers to analyze. The script saves a PowerShell script into the %Temp% directory and executes it. The running script then downloads the Haartoppens.Eft file, which executes an additional PowerShell script. This script is also obfuscated and is designed to load a shellcode to the wab.exe process.

    Source: asec.ahnlab.com

    The shellcode maintains its persistence by adding a registry key to the infected system, and then accesses a remote C&C server to load additional instructions. The instructions ultimately download the Remcos RAT malware for execution on infected systems.

    Remcos RAT malware

    The Remcos RAT collects system information from infected systems and stores keylogging data in the %AppData% directory. The malware then sends this data to the remote command-and-control (C&C) server, which is hosted through a DuckDNS domain.

    Source: asec.ahnlab.com

    Remcos is a commercial remote access tool (RAT) that is advertised as a legitimate tool, but has been observed in numerous threat actor campaigns. Successful loading of Remcos opens a backdoor on targeted systems, allowing for complete control.

    The researchers have shared the following indicators to help detect and stop this campaign:

    IOCs (Indicators of Compromise)

    b066e5f4a0f2809924becfffa62ddd3b (Invoice_order_new.uue)
    7e6ca4b3c4d1158f5e92f55fa9742601 (Invoice_order_new.vbs)
    fd14369743f0ccd3feaacca94d29a2b1 (Talehmmedes.txt)
    eaec85388bfaa2cffbfeae5a497124f0 (mtzDpHLetMLypaaA173.bin)

    Hostinger

    File Detection

    Downloader/VBS.Agent (2024.05.17.01)
    Data/BIN.Encoded (2024.05.24.00)

    C&C (Command & Control) Servers

    frabyst44habvous1.duckdns[.]org:2980:0
    frabyst44habvous1.duckdns[.]org:2981:1
    frabyst44habvous2.duckdns[.]org:2980:0

    The researchers also shared the following general recommendations to avoid similar phishing campaigns:

    Refrain from accessing emails from unknown sources.
    Refrain from running or enabling macro commands when accessing downloaded attachment files. Users can set programs to highest levels of security, as lower levels may automatically execute macro commands without displaying any notification.
     Update anti-malware engines to their latest versions.

    The UUE file format has previously been used in several malicious campaigns due to its ability to easily evade detection from security tools, with a researcher previously discovering a UUEncode vulnerability in the main Python program.

    Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleApple Launches ‘Private Cloud Compute’ Along with Apple Intelligence AI
    Next Article Cleveland Closes City Hall After Unspecified Cyberattack

    Related Posts

    Security

    Google dicht actief misbruikt V8-beveiligingslek in Chrome

    June 3, 2025
    Security

    Multiple HPE StoreOnce Vulnerabilities Let Attackers Execute Malicious Code Remotely

    June 3, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Daisy – general-purpose TUI scientific calculator

    Linux

    Always deploy at peak traffic

    Learning Resources

    Apple becomes the world’s most valuable company (again) ahead of Microsoft after recently unveiling its AI strategy

    Development

    CVE-2025-4466 – iSourcecode Gym Management System SQL Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    3 Apple Intelligence features that would convince me to ditch Gemini and ChatGPT

    May 29, 2025

    With WWDC 2025 around the corner, Apple is facing one of its biggest challenges yet:…

    CVE-2025-4912 – SourceCodester Student Result Management System Image File Handler Remote Path Traversal Vulnerability

    May 19, 2025

    10 Most In-demand Tech Skills for Freelancers on Upwork in 2024

    June 24, 2024

    Microsoft AI Introduces SCBench: A Comprehensive Benchmark for Evaluating Long-Context Methods in Large Language Models

    December 18, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.