AhnLab Safety Intelligence Middle (ASEC) has recognized an energetic Remcos RAT marketing campaign focusing on customers in South Korea.
The malware is being unfold by a number of channels. It typically masquerades as VeraCrypt utilities or instruments used inside unlawful on-line playing ecosystems.
As soon as put in, the RAT can steal login credentials, monitor person exercise, and provides attackers distant management over compromised techniques.
Within the first an infection state of affairs, the malware is disguised as a “Blocklist Person DB Lookup *****Membership” program. In unlawful playing circles, “Blocklist person” usually refers to accounts which have been restricted or flagged because of suspicious or undesirable exercise.
This system’s GUI pretends to question a distant database functioning as a command-and-control (C2) server to test these restricted accounts.
The malware has been distributed by internet browsers and Telegram utilizing filenames resembling:
Distribution Path
| Distribution Path |
|---|
| %USERPROFILEpercentdownloadsprograms*****usercon.exe |
| %USERPROFILEpercentdownloadstelegram desktop*****usercon.exe |
| %USERPROFILEpercentdownloadsprogramsblackusernon.exe |
These names, together with GUI strings like “*****Membership,” strongly recommend that the malware is being unfold as a supposed “blocklist person lookup” instrument for operators or customers of unlawful sports activities‑betting and on line casino websites.
Though the precise web sites used for preliminary distribution are usually not but recognized, the thematic alignment with playing tooling signifies a targeted focusing on of this underground ecosystem.
The faux lookup program’s login perform is non‑operational, serving primarily as a decoy. Internally, the executable accommodates two malicious VBS scripts embedded in its useful resource part.

When this system runs, these scripts are written to the %TEMP% listing below randomized filenames after which executed, silently beginning the an infection chain within the background.
A second variant impersonates a VeraCrypt utility installer and is delivered as installer.exe. This pattern is packed as a 7z self‑extracting (SFX) archive and equally features a malicious VBS script.
By abusing VeraCrypt’s fame as a reputable disk encryption instrument, attackers enhance the probabilities that normal customers will belief and execute the installer, extending the marketing campaign’s influence past simply playing‑associated targets are famous.
The assault chain depends on a number of scripted phases, heavy obfuscation, and deceptive file extensions to evade evaluation and detection. The phases noticed embody:
StageTypeName/Instance
| Stage | Kind | Identify/Instance |
|---|---|---|
| 1 | Installer | (Pretend DB instrument / VeraCrypt) |
| 2 | VBS downloader | %TEMP%[Random].vbs |
| 3 | VBS dropper | XX12.JPG |
| 4 | VBS downloader | Config.vbs |
| 5 | VBS downloader | L1k9.JPG |
| 6 | PowerShell downloader | NMA1.JPG |
| 7 | Injector | XIN_PHOTO.JPG |
| 8 | Remcos RAT payload | Aw21.JPG |
The menace actor embeds Base64‑encoded PE payloads inside recordsdata that fake to be JPG photographs, putting the payload between separator strings and surrounding it with dummy feedback and junk knowledge.
After passing by 5 scripted phases, the chain in the end drops and executes a . NET‑primarily based injector.
This injector sends execution logs to the attacker through Discord Webhooks, then downloads the Remcos RAT payload from a URL supplied as an argument.
It decrypts the payload and injects it into the reputable AddInProcess32.exe course of. Notably, this injector consists of Korean‑language messages and strings which can be unusual in different recognized Remcos workflows, suggesting localization for South Korean victims.
Remcos RAT Capabilities
Remcos RAT is a commercially offered distant administration instrument that’s steadily abused for malicious functions. As soon as put in, it supplies attackers with in depth management and knowledge‑theft capabilities, together with:
- Distant command execution, file administration, and course of contro.
- Keylogging and clipboard monitoring.
- Screenshot seize and surveillance through webcam and microphone.
- Theft of saved credentials from internet browsers and different purposes.
The analyzed samples retailer their configuration inside an encrypted useful resource named “SETTINGS.” As soon as decrypted, this reveals the C2 servers and different parameters. Noticed configurations embody:

Some variants fake to be a “inventory worth ticker” and make use of Korean strings in mutex names and registry keys.
In variations the place offline keylogging is enabled, captured keystrokes are saved regionally below %ALLUSERSPROFILEpercentremcos, additional exposing victims’ login IDs, passwords, and different delicate textual content enter.
The marketing campaign demonstrates that Remcos RAT operators are actively focusing on South Korean customers, with a specific concentrate on people concerned in unlawful on-line playing.
On the identical time, the usage of bogus VeraCrypt installers reveals that common customers will also be affected in the event that they obtain instruments from untrusted sources.
As a result of Remcos helps distant management, credential theft, keylogging, and full person surveillance, an an infection can result in extreme privateness violations, account takeover, and potential monetary loss.
Customers and organizations ought to keep away from downloading software program from unknown or unofficial sources, confirm installers through checksums or trusted portals, and preserve up‑to‑date safety options able to detecting script‑primarily based downloaders, obfuscated VBS/PowerShell, and RAT conduct.
Any system suspected of an infection ought to be remoted, totally scanned, and have all credentials modified instantly after remediation.
Observe us on Google Information, LinkedIn, and X to Get Prompt Updates and Set GBH as a Most popular Supply in Google.









