{"id":6369,"date":"2021-06-02T09:48:48","date_gmt":"2021-06-02T16:48:48","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=6369"},"modified":"2024-08-07T12:22:22","modified_gmt":"2024-08-07T19:22:22","slug":"remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence\/","title":{"rendered":"RemcosRAT Malspam Campaign Spoofs UAE Machinery Company Correspondence"},"content":{"rendered":"<h3><strong>Author: Nick Sundvall<\/strong><\/h3>\n<h3><strong>TLP: WHITE<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<h3>Overview<\/h3>\n<p>On 23 May, we observed a malspam campaign distributing a ZIP file containing Remcos, a remote access trojan (RAT) designed to remotely control a victim\u2019s computer. The campaign\u2019s email subjects attempted to gain the victim\u2019s trust by impersonating a legitimate United Arab Emirates company called Al Salehi Machinery &amp; Equipment Repairing.<\/p>\n<p>We have previously reported on various Remcos campaigns, including one distributing the malware via malicious RTF files in 2019 and another via malicious XLS files in 2020.<sup>[1]<\/sup><sup>,[2]<\/sup><\/p>\n<h3>Customer Impact<\/h3>\n<p>A German company called Breaking Security has been offering Remcos for sale online since 2016.<sup>[3]<\/sup> There is currently a free version available with limited features, as well as a paid version starting at 58 Euros. While it is marketed as a legitimate remote administration tool, it is frequently abused by threat actors and used for malicious purposes.<\/p>\n<p>Breaking Security actively maintains and updates Remcos. Its capabilities include remotely controlling infected computers, logging keystrokes, taking screenshots and more.<strong>\u00a0<\/strong><\/p>\n<h3>Campaign Analysis<\/h3>\n<p>The threat actor behind this campaign used the email subject <em>RE: Stanadyne Enquiry<\/em>, imitating a conversation between Al Salehi Machinery &amp; Equipment Repairing and Stanadyne, a fuel pump manufacturer. The emails included links to a legitimate website for Al Salehi, as well as their Facebook and LinkedIn pages. The sender\u2019s address, <em>purchase@alsalehi[.]ae<\/em>, also adds legitimacy to the emails.<\/p>\n<p>Attached to the emails is a ZIP file named <em>Al Salehi Machinery &amp; Equipment Repairing Enquiry.zip<\/em>, containing the malicious Remcos executable <em>Al Salehi Machinery &amp; Equipment Repairing Enquiry.exe<\/em>.<\/p>\n<h3>Attack Chain<\/h3>\n<p>Upon opening the attached ZIP file, the victim is able to extract the malicious EXE &#8211; <em>Al Salehi Machinery &#038; Equipment Repairing Enquiry.exe<\/em> &#8211; from the archive. Running the EXE initiates the Remcos RAT.<\/p>\n<p>From here, Remcos reaches out to Google and Bing before finally contacting its command and control (C&#038;C) server. The threat actor then gains remote control of the computer and is able to run additional commands and send new payloads.<\/p>\n<h3>Vulnerabilities &#038; Mitigation<\/h3>\n<p>Malspam email campaigns are a common distribution method for phishing scams. Infoblox therefore recommends the following precautions to avoid phishing attacks:<\/p>\n<ul>\n<li>Scan downloaded files with antivirus software.<\/li>\n<li>Verify important or potentially legitimate attachments with the sender via alternative means (e.g. by phone or in person) before opening them.<\/li>\n<li>Be aware of any attachment\u2019s file type, and never open files that could be a script (.vbs, .cmd, .bat), an internet shortcut file, or compression file. Using the latter is a known method for evading detection methods based on file hashes and signatures. Threat actors use them to mask the real malicious file due to email service restrictions on attachment file types.<\/li>\n<li>Always be suspicious of vague or empty emails, especially if there is a prompt to open an attachment or click on a link.<\/li>\n<li>Do not open attachments that are unexpected or from unfamiliar senders.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/threat-intelligence-123.jpg\" alt=\"\" width=\"589\" height=\"697\" class=\"aligncenter size-full wp-image-6548\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threat-intelligence-123.jpg 589w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threat-intelligence-123-254x300.jpg 254w\" sizes=\"auto, (max-width: 589px) 100vw, 589px\" \/><\/p>\n<h3><strong>Endnotes<\/strong><\/h3>\n<ol>\n<li><a href=\"https:\/\/insights.infoblox.com\/threat-intelligence-reports\/threat-intelligence--32\">https:\/\/insights.infoblox.com\/threat-intelligence-reports\/threat-intelligence&#8211;32<\/a><\/li>\n<li><a href=\"https:\/\/insights.infoblox.com\/threat-intelligence-reports\/threat-intelligence--94\">https:\/\/insights.infoblox.com\/threat-intelligence-reports\/threat-intelligence&#8211;94<\/a><\/li>\n<li><a href=\"https:\/\/any.run\/malware-trends\/remcos\">https:\/\/any.run\/malware-trends\/remcos<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Author: Nick Sundvall TLP: WHITE &nbsp; Overview On 23 May, we observed a malspam campaign distributing a ZIP file containing Remcos, a remote access trojan (RAT) designed to remotely control a victim\u2019s computer. The campaign\u2019s email subjects attempted to gain the victim\u2019s trust by impersonating a legitimate United Arab Emirates company called Al Salehi Machinery [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":6717,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[553],"tags":[294,441,506,189],"class_list":{"0":"post-6369","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-campaign-briefs","8":"tag-malspam","9":"tag-rat","10":"tag-remcos","11":"tag-cybersecurity","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>RemcosRAT Malspam Campaign Spoofs UAE Machinery Company Correspondence<\/title>\n<meta name=\"description\" content=\"RemcosRAT Malspam Campaign Spoofs UAE Machinery Company Correspondence. On 23 May, we observed a malspam campaign distributing a ZIP file containing Remcos, a remote access trojan (RAT) designed to remotely control a victim\u2019s computer. The campaign\u2019s email subjects attempted to gain the victim\u2019s trust by impersonating a legitimate United Arab Emirates company called Al Salehi Machinery &amp; Equipment Repairing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RemcosRAT Malspam Campaign Spoofs UAE Machinery Company Correspondence\" \/>\n<meta property=\"og:description\" content=\"RemcosRAT Malspam Campaign Spoofs UAE Machinery Company Correspondence. On 23 May, we observed a malspam campaign distributing a ZIP file containing Remcos, a remote access trojan (RAT) designed to remotely control a victim\u2019s computer. The campaign\u2019s email subjects attempted to gain the victim\u2019s trust by impersonating a legitimate United Arab Emirates company called Al Salehi Machinery &amp; Equipment Repairing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-02T16:48:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-07T19:22:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-14.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"409\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"RemcosRAT Malspam Campaign Spoofs UAE Machinery Company Correspondence\",\"datePublished\":\"2021-06-02T16:48:48+00:00\",\"dateModified\":\"2024-08-07T19:22:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence\\\/\"},\"wordCount\":505,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-14.jpg\",\"keywords\":[\"Malspam\",\"RAT\",\"remcos\",\"Cybersecurity\"],\"articleSection\":[\"Cyber Campaign Briefs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence\\\/\",\"name\":\"RemcosRAT Malspam Campaign Spoofs UAE Machinery Company Correspondence\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-14.jpg\",\"datePublished\":\"2021-06-02T16:48:48+00:00\",\"dateModified\":\"2024-08-07T19:22:22+00:00\",\"description\":\"RemcosRAT Malspam Campaign Spoofs UAE Machinery Company Correspondence. On 23 May, we observed a malspam campaign distributing a ZIP file containing Remcos, a remote access trojan (RAT) designed to remotely control a victim\u2019s computer. The campaign\u2019s email subjects attempted to gain the victim\u2019s trust by impersonating a legitimate United Arab Emirates company called Al Salehi Machinery & Equipment Repairing.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-14.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-14.jpg\",\"width\":612,\"height\":409,\"caption\":\"Online internet secure payment and network safe communication and banking concept. Person pay in web via computer. Locks and padlocks on diagram.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Campaign Briefs\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"RemcosRAT Malspam Campaign Spoofs UAE Machinery Company Correspondence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"RemcosRAT Malspam Campaign Spoofs UAE Machinery Company Correspondence","description":"RemcosRAT Malspam Campaign Spoofs UAE Machinery Company Correspondence. On 23 May, we observed a malspam campaign distributing a ZIP file containing Remcos, a remote access trojan (RAT) designed to remotely control a victim\u2019s computer. The campaign\u2019s email subjects attempted to gain the victim\u2019s trust by impersonating a legitimate United Arab Emirates company called Al Salehi Machinery & Equipment Repairing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence\/","og_locale":"en_US","og_type":"article","og_title":"RemcosRAT Malspam Campaign Spoofs UAE Machinery Company Correspondence","og_description":"RemcosRAT Malspam Campaign Spoofs UAE Machinery Company Correspondence. On 23 May, we observed a malspam campaign distributing a ZIP file containing Remcos, a remote access trojan (RAT) designed to remotely control a victim\u2019s computer. The campaign\u2019s email subjects attempted to gain the victim\u2019s trust by impersonating a legitimate United Arab Emirates company called Al Salehi Machinery & Equipment Repairing.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence\/","og_site_name":"Infoblox Blog","article_published_time":"2021-06-02T16:48:48+00:00","article_modified_time":"2024-08-07T19:22:22+00:00","og_image":[{"width":612,"height":409,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-14.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"RemcosRAT Malspam Campaign Spoofs UAE Machinery Company Correspondence","datePublished":"2021-06-02T16:48:48+00:00","dateModified":"2024-08-07T19:22:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence\/"},"wordCount":505,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-14.jpg","keywords":["Malspam","RAT","remcos","Cybersecurity"],"articleSection":["Cyber Campaign Briefs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence\/","name":"RemcosRAT Malspam Campaign Spoofs UAE Machinery Company Correspondence","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-14.jpg","datePublished":"2021-06-02T16:48:48+00:00","dateModified":"2024-08-07T19:22:22+00:00","description":"RemcosRAT Malspam Campaign Spoofs UAE Machinery Company Correspondence. On 23 May, we observed a malspam campaign distributing a ZIP file containing Remcos, a remote access trojan (RAT) designed to remotely control a victim\u2019s computer. The campaign\u2019s email subjects attempted to gain the victim\u2019s trust by impersonating a legitimate United Arab Emirates company called Al Salehi Machinery & Equipment Repairing.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-14.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-14.jpg","width":612,"height":409,"caption":"Online internet secure payment and network safe communication and banking concept. Person pay in web via computer. Locks and padlocks on diagram."},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Cyber Campaign Briefs","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/cyber-campaign-briefs\/"},{"@type":"ListItem","position":4,"name":"RemcosRAT Malspam Campaign Spoofs UAE Machinery Company Correspondence"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6369","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=6369"}],"version-history":[{"count":5,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6369\/revisions"}],"predecessor-version":[{"id":6549,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6369\/revisions\/6549"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/6717"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=6369"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=6369"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=6369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}