Work Sample: Remcos RAT Analysis

In summer of 2022, I setup a small lab environment at home to practice fundamental skills in incident response, digital forensics, malware analysis, and reverse engineering. I practiced these skills by studying the Remcos remote access trojan, and reported my analysis findings in the context of CISA’s Incident Response Process, which is:

Phase I, Cyber Threat Intelligence
Phase II, Detection and Analysis
Phase III, Containment
Phase IV, Eradication and Recovery
Phase V, Post-Incident Activities

This 48 page report concludes with a summary about the key findings from analyzing Remcos, as well as listing the discovered indicators of compromise, analysis tools used, and research references from top vendors and community resources.