Sunday, May 18, 2025
HomeMalwarePowerPoint Slide Show Infected by New Malware that Exploiting Zero-day RCE...

PowerPoint Slide Show Infected by New Malware that Exploiting Zero-day RCE Vulnerability

Published on

SIEM as a Service

Follow Us on Google News

New Malware that abuses MS Power point slide show by Exploiting the CVE-2017-0199 (Zero-day remote code execution vulnerability) flow Exists in Windows OLE (Object Linking and Embedding).

Malicious Rich Text File (RTF) documents used for Exploit this Vulnerability by using Microsoft Office interface to Deliver this Malware.

This Malware used by the same Method of DRIDEX Trojan that was integrated with Auto Bomb Technique.

- Advertisement - Google News

Cyber security Firm Trend Micro Discover this Trojan as TROJ_CVE20170199.JVU through Phishing Main Campaign.

Malware Working Flow

Same as other Malware, spear-phishing email method is used for spreading this Trojan with attached Malicious PPSX file.

The attacker uses Fraudulent Email send address look like a legitimate Business partner that involved in the electronics manufacturing industry.

Zero-day

Malicious Email with Attached PPSX file

This Email seems to be an order request but it contains Attacked Malicious PPSX file.

It shows CVE-2017-8570 once the Powerpoint slide is opened, that is meant to be different Microsoft Vulnerability.But instead of that it actually Performing an Exploitation of Another Microsoft Vulnerability (CVE-2017-0199).

Once this Malware triggered in victims machine exploit runs the remote code at “http://192.166.218.230:3550/logo.doc” which is a VPN or hosting service that is abused by the attacker.
Zero-day
Image Source: Trend Micro

Abused VPN or Hosting IP

Later it will Download the Malicious logo.doc File from the Command & Control server

Zero-day
Image Source: Trend Micro

Malware Execution Road MAP

According to Trend Micro ,This logo.doc file is an XML format with Embedded JavaScript Code that will runs a PowerShell command to download and execute the file known as RATMAN.EXE .

The executable is actually a trojanized version of the REMCOS remote access tool (RAT) from the (C&C) server: http://192.166.218.230:3550/ratman[.]exe, which is located in Poland.

Finally RATMAN.EXE connect to the C&C Server(5.134.116.146:3550 ) for the Execution and allow the remote code to Execute into the victims machine.

REMCOS RAT Capability

REMCOS RAT is legitimate Remote Access tool that can help to control the system from anywhere is the World.

It can able to Execute the remote commands on the user’s system  Once REMCOS is executed.

The tool’s capabilities are quite comprehensive, and includes a download & execute command, a keylogger, a screen logger, and recorders for both webcam and microphone.Trend Micro said.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Printer Company Distributes Malicious Drivers Infected with XRed Malware

Procolored, a printer manufacturing company, has been found distributing software drivers infected with malicious...

Frigidstealer Malware Targets macOS Users to Harvest Login Credentials

An macOS users, a new information-stealing malware dubbed FrigidStealer has emerged as a formidable...

SSH Auth Key Reuse Uncovers Advanced Targeted Phishing Campaign

A meticulously orchestrated phishing campaign targeting Kuwait's fisheries, telecommunications, and insurance sectors has been...