Remy

Description

(Cylance) Arriving as an obfuscated PowerShell script built using the MSFvenom psh-reflection payload, the Remy DLL payload is ultimately unpacked, injected into memory, and executed via a Veil shellcode payload.

The Remy DLL shares code with Backdoor.Win32.Denis (Kaspersky), and appears to be related to the “WINDSHIELD” malware (described in the FireEye APT32 report).

Names

Name
Remy
Remy RAT
WINDSHIELD

Category

Malware

Type

  • Backdoor

Information

Malpedia

Other Information

Uuid

5f4763dc-2637-4fd7-8387-29de883b56ba

Last Card Change

2022-12-29