Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Signed malware impersonating workplace apps deploys RMM backdoors

0
Medium
Published: Wed Mar 04 2026 (03/04/2026, 00:20:30 UTC)
Source: AlienVault OTX General

Description

Multiple phishing campaigns were identified using workplace meeting lures, PDF attachments, and abuse of legitimate binaries to deliver signed malware. The attacks used digitally signed executables masquerading as legitimate software to install remote monitoring and management (RMM) tools like ScreenConnect, Tactical RMM, and Mesh Agent. These tools enabled attackers to establish persistence and move laterally within compromised environments. The malware was signed using an Extended Validation certificate issued to TrustConnect Software PTY LTD. The campaigns demonstrate how familiar branding and trusted digital signatures can be exploited to bypass user suspicion and gain an initial foothold in enterprise networks.

AI-Powered Analysis

AILast updated: 03/04/2026, 11:32:39 UTC

Technical Analysis

This threat involves multiple phishing campaigns that distribute malware digitally signed with an Extended Validation (EV) certificate issued to TrustConnect Software PTY LTD. The signed malware masquerades as legitimate workplace meeting applications, leveraging trusted digital signatures to evade detection and user suspicion. The attackers use phishing emails containing workplace meeting lures and PDF attachments to deliver the payload. The malware installs remote monitoring and management (RMM) tools such as ScreenConnect, Tactical RMM, and Mesh Agent, which are legitimate software often used by IT administrators. By abusing these tools, attackers establish persistence mechanisms and enable lateral movement within compromised enterprise networks. The use of EV certificates is particularly notable because it increases the likelihood that security controls and users will trust the executables. The campaigns also abuse legitimate binaries to execute malicious code, further complicating detection. The tactics align with MITRE ATT&CK techniques including T1543.003 (Create or Modify System Process: Windows Service), T1553.002 (Code Signing), T1566 (Phishing), and others related to persistence, lateral movement, and defense evasion. Although no known exploits are reported in the wild, the threat demonstrates a sophisticated attack chain that combines social engineering, trusted code signing, and abuse of legitimate RMM tools to maintain access and control over targeted environments.

Potential Impact

The impact of this threat on organizations worldwide can be significant. By leveraging trusted digital signatures and familiar workplace application branding, attackers can bypass traditional security controls and user skepticism, increasing the likelihood of successful initial compromise. Once inside, the deployment of RMM tools allows attackers to maintain persistent access, monitor activities, and move laterally across networks, potentially compromising sensitive data and critical systems. This can lead to data breaches, intellectual property theft, operational disruption, and increased risk of ransomware or other secondary attacks. The abuse of legitimate tools complicates detection and response efforts, potentially extending dwell time and increasing remediation costs. Enterprises relying heavily on remote management solutions and those with large, distributed workforces using workplace collaboration tools are particularly at risk. The threat also poses reputational risks due to the exploitation of trusted certificates and software brands.

Mitigation Recommendations

Organizations should implement multi-layered defenses specifically tailored to this threat. First, enforce strict code signing policies and verify the provenance of digitally signed executables, including checking certificate revocation status and issuer legitimacy. Employ application allowlisting to restrict execution of unauthorized binaries, especially those signed by unknown or suspicious certificates. Enhance email security by deploying advanced phishing detection technologies that analyze attachments and URLs for malicious content, and conduct regular user awareness training focused on phishing and social engineering tactics. Monitor for unusual use of RMM tools and legitimate binaries, including unexpected installations or network connections initiated by these tools. Implement network segmentation to limit lateral movement opportunities and apply the principle of least privilege to reduce attacker access scope. Use endpoint detection and response (EDR) solutions capable of detecting abuse of legitimate tools and anomalous process behaviors. Regularly audit and update RMM software to the latest versions and restrict administrative access to these tools. Finally, maintain robust incident response plans that include procedures for identifying and removing malicious RMM deployments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.microsoft.com/en-us/security/blog/2026/03/03/signed-malware-impersonating-workplace-apps-deploys-rmm-backdoors/"]
Adversary
null
Pulse Id
69a77ace20faf9114cbb120b
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash0507b89eeb35741df61eeff7769b3397
hash253238019e1ea386d2d72584bff8eadf4f5ec5b3
hash5701dabdba685b903a84de6977a9f946accc08acf2111e5d91bc189a83c3faea
hash1649e35d73a5b9cd9251ee7b4842bef6
hash1b06c31e5c11f4fcfc52460852fd44be
hash575e7adf57f741ba8ce32bfe83a1e7f4
hash88374c5b7e56b7d0c21c08a8075b1ada
hasha6b1edca753b4d618d8b2f09eaa9e2af
hashbd45296ec3006176fe07d784bbe00bea
hashc7cbe37a075ceb7283b6ea1feaf8e085
hashec54c5089d27b2ad844b96725924a22b
hashf55a1ee56f84bd6237f6833789b3a7ac
hash5f61a36bfe588b07ae88d0786742e3983f66171f
hash75e45900247ff595f1f67d45c16a4ec4bdabe60c
hasha12bc988d5b0b0e3c0c6b143851838e3d8786927
hashe0d22391f7046dccf22ba0caf066eef25801b83b
hashe1307cf83815818cf22c5dde25edcb26a493c791
hasheb165bc46f2f94b1b14d2c4c08b29a51389093ed
hashf086e99ae0f2001ee0c74f3c92a878031a40ed74
hash35f03708f590810be88dfb27c53d63cd6bb3fb93c110ca0d01bc23ecdf61f983
hash36fdd4693b6df8f2de7b36dff745a3f41324a6dacb78b4159040c5d15e11acb7
hash4c6251e1db72bdd00b64091013acb8b9cb889c768a4ca9b2ead3cc89362ac2ca
hash6641561ed47fdb2540a894eb983bcbc82d7ad8eafb4af1de24711380c9d38f8b
hash86b788ce9379e02e1127779f6c4d91ee4c1755aae18575e2137fb82ce39e100f
hash947bcb782c278da450c2e27ec29cb9119a687fd27485f2d03c3f2e133551102e
hash959509ef2fa29dfeeae688d05d31fff08bde42e2320971f4224537969f553070
hash9827c2d623d2e3af840b04d5102ca5e4bd01af174131fc00731b0764878f00ca
hash98a4d09db3de140d251ea6afd30dcf3a08e8ae8e102fc44dd16c4356cc7ad8a6
hashaf651ebcacd88d292eb2b6cbbe28b1e0afd1d418be862d9e34eacbd65337398c
hashc6097dfbdaf256d07ffe05b443f096c6c10d558ed36380baf6ab446e6f5e2bc3
hashc862dbcada4472e55f8d1ffc3d5cfee65d1d5e06b59a724e4a93c7099dd37357
hashedde2673becdf84e3b1d823a985c7984fec42cb65c7666e68badce78bd0666c0
hashef7702ac5f574b2c046df6d5ab3e603abe57d981918cddedf4de6fe41b1d3288

Ip

ValueDescriptionCopy
ip154.16.171.203
ip136.0.157.51
ip173.195.100.77

Url

ValueDescriptionCopy
urlhttp://yad.ma/Union/Colony/complete.phphttps[://]www.metrosuitesbellavie.com/crewe/cjo/yte/MsTeams.exe

Domain

ValueDescriptionCopy
domainadb-pro.design
domainchata2go.com.mx
domaineasyguidepdf.com
domaineliteautoused-cars.com
domainhttpsecured.im
domainlankystocks.com
domainpacificlimited.mw
domainsherwoods.ae
domainsunride.com.do
domainwaynelimck.com
domainturn.zoomworkforce.usrightrecoveryscreen.topsmallmartdirectintense.comr9.virtualonlineserver.orgapp.ovbxbzuaiopp.onlineserver.denako-cin.cccold-na-phx-7.gofile.ioabsolutedarkorderhqx.comapp.amazonwindowsprime.compub-a6b1edca753b4d618d8b2f09eaa9e2af.r2.devcold-na-phx-8.gofile.ioserver.yakabanskreen.topserver.nathanjhooskreen.topread.pibanerllc.de
domainwww.metrosuitesbellavie.com

Threat ID: 69a814c4d1a09e29cb2cff34

Added to database: 3/4/2026, 11:17:24 AM

Last enriched: 3/4/2026, 11:32:39 AM

Last updated: 3/5/2026, 6:28:32 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses