RCSession

Description

(SecureWorks) This basic RAT is installed via DLL side-loading, and CTU researchers observed BRONZE PRESIDENT installing it on multiple hosts during intrusions. RCSession was extracted from a file called English.rtf and launched via a hollowed svchost.exe process. RCSession connects to its C2 server via a custom protocol, can remotely execute commands, and can launch additional tools. CTU researchers have no evidence of other threat actors using RCSession or of wide proliferation of the tool, suggesting it may be exclusively used by BRONZE PRESIDENT.

Names

Name
RCSession

Category

Malware

Type

  • Backdoor

Information

Mitre Attack

Other Information

Uuid

07e50a75-39c7-4cab-b156-8f3fb1d13732

Last Card Change

2022-12-30