New Malware that abuses MS Power point slide show by Exploiting the CVE-2017-0199 (Zero-day remote code execution vulnerability) flow Exists in Windows OLE (Object Linking and Embedding).
Malicious Rich Text File (RTF) documents used for Exploit this Vulnerability by using Microsoft Office interface to Deliver this Malware.
This Malware used by the same Method of DRIDEX Trojan that was integrated with Auto Bomb Technique.
Cyber security Firm Trend Micro Discover this Trojan as TROJ_CVE20170199.JVU through Phishing Main Campaign.
Malware Working Flow
Same as other Malware, spear-phishing email method is used for spreading this Trojan with attached Malicious PPSX file.
The attacker uses Fraudulent Email send address look like a legitimate Business partner that involved in the electronics manufacturing industry.
Malicious Email with Attached PPSX file
This Email seems to be an order request but it contains Attacked Malicious PPSX file.
It shows CVE-2017-8570 once the Powerpoint slide is opened, that is meant to be different Microsoft Vulnerability.But instead of that it actually Performing an Exploitation of Another Microsoft Vulnerability (CVE-2017-0199).
Once this Malware triggered in victims machine exploit runs the remote code at “http://220.127.116.11:3550/logo.doc” which is a VPN or hosting service that is abused by the attacker.
Abused VPN or Hosting IP
Later it will Download the Malicious logo.doc File from the Command & Control server
Malware Execution Road MAP
The executable is actually a trojanized version of the REMCOS remote access tool (RAT) from the (C&C) server: http://18.104.22.168:3550/ratman[.]exe, which is located in Poland.
Finally RATMAN.EXE connect to the C&C Server(22.214.171.124:3550 ) for the Execution and allow the remote code to Execute into the victims machine.
REMCOS RAT Capability
REMCOS RAT is legitimate Remote Access tool that can help to control the system from anywhere is the World.
It can able to Execute the remote commands on the user’s system Once REMCOS is executed.
The tool’s capabilities are quite comprehensive, and includes a download & execute command, a keylogger, a screen logger, and recorders for both webcam and microphone.Trend Micro said.