• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Technical  /  Deceptive Layoff-Themed HR Email Distributes Remcos RAT Malware
09 December 2025

Deceptive Layoff-Themed HR Email Distributes Remcos RAT Malware

Written by Prashil Moon
Prashil Moon
Technical

Over the past few months, job economy has been marked by uncertainty, with constant news about layoffs, restructuring, hiring freezes, and aggressive cost-cutting measures. This atmosphere has created widespread anxiety among both employees and organizations, and cybercriminals have quickly learned to exploit these emotions.

Malware authors increasingly craft phishing emails and malicious attachments disguised as termination notices, updated HR policies, severance documents, or “urgent layoff lists,” preying on people’s fear and curiosity. In moments of stress, employees are more likely to click on suspicious files or links without verifying their authenticity, giving attackers an easy entry point into corporate networks. As layoffs continue to dominate headlines, threat actors are leveraging this vulnerability at scale, using believable layoff-themed lures to deliver malware, steal credentials, and launch broader cyberattacks.

At Seqrite Labs, during our monitoring we observed one of such a spam campaign distributing malware through emails disguised as internal HR announcements. Attackers delivered a malicious attachment posing as a “staff record pdf”. Files in attachment is an NSIS compiled remote access tool, Remcos.

Initial Vector

Initial vector of the campaign is an email pretends to be a “Staff Performance Report for October 2025”, supposedly sent by the company’s HR Department. The message is intentionally brief and formal, with a reference to “employees to be terminated”, designed to increase the chances of the attachment being opened.

Fig-1 : Emails disguised as internal HR announcements

As we can see in above image, despite appearing to contain a PDF document, the email attachment is a RAR archive named using a double-extension (pdf.rar) to conceal its true nature. Inside the archive is not a document, but a NSIS-compiled executable masquerading as “staff record pdf”. Upon execution, the file performs initialization, configuration and further malicious activity.

This neatly designed spam email highlights how threat actors continue to rely on social engineering and lures tied to current organizational trends to gain initial access to targeted victims.

Analysis of Attachment

The email attachment, named “staff record pdf.rar”, is intentionally designed to appear like a PDF file. Inspection of the archive reveals that it contains a single Windows executable with name “staff record pdf.exe”, masquerading as a document. This double-extension naming convention (pdf.exe) is a common technique used to mislead users and evade basic file-type identification.

Analysis of the Embedded Executable File

The executable file embedded in attachment is a Remcos RAT and is a NSIS (Nullsoft Scriptable Install System) compiled executable, a packaging format commonly abused by threat actors to conceal its intent.

Fig-2: Payload in Detect it Easy

Once the file is executed it drops NSIS related configuration files at below location –

  • C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\
Fig-3: NSIS Configuration File Setup

Then the file is self copied to below location –

  • c:\ProgramData\Remcos\remcos.exe

Remcos creates and stores victim related and other configuration data at below registry –

  • HKCU\Software\Rmc-<VictimID>
Fig-4: Remcos Configuration/Marker in Registry

 Key and Values in configuration registry –

  1. exepath – Values are Encrypted and stores path to the installed EXE.
  2. licence – Probably, cracked Remcos licence key.
  3. time – UNIX timestamp when Remcos first executed.
  4. UID – Victim machine ID.

Persistence

Persistence is achieved by adding itself in commonly known Run registry –

  • HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
  • Rmc-4E12ZU = c:\ProgramData\Remcos\remcos.exe

Post-Deployment activity and CnC Communication

After setup, the Remcos payload spawns multiple threads, each responsible for different operational components of the RAT. These threads handle capabilities such as keylogging, screen capture, clipboard monitoring, and the main command-handling loop.

A few seconds later, the malware establishes an outbound connection to its command-and-control server , confirming that the RAT is fully active and ready to receive instructions from the attacker.

Conclusion

This campaign highlights how threat actors continue to exploit ongoing workforce-related conditions to deliver malware through convincing social-engineering lures. In this case, a simple HR-themed message was enough to disguise an NSIS-based Remcos on the system.

Once installed, Remcos establishes persistence, collects system information, and prepares the infected host for remote access.

Organizations should ensure that staff remain cautious when handling unsolicited HR or performance related communications and reinforce email security controls capable of detecting malicious archives and executable payloads.

Indicators of Compromise (IoC)

Hashes (MD5)

c95f2a7556902302f352c97b7eed4159

6f7d3f42fa6fe3b0399c42473f511acc

76c28350c8952aef08216d9493bae385

CnC 

196.251.116.219

Seqrite/QH Detection 

Trojan.Remcos.S38451216

MITRE Attack Tactics, Techniques, and Procedures (TTP’s) 

Tactics (ATT&CK ID) Techniques /
Sub-technique (ID)
Procedure
Initial Access (TA0001) T1566.001 Delivery of a malicious HR-themed email.
Execution (TA0002) T1204.002 User opens the double-extension file disguised as a PDF.
Defense Evasion (TA0005) T1036 Executable masquerades as a PDF inside a RAR archive.
Defense Evasion (TA0005) T1027 Use of NSIS compiler to hide actual code.
Persistence (TA0003) T1547.001 Remcos registers itself at –
HKCU\Software\Microsoft\Windows\CurrentVersion\Run for autorun.
Persistence (TA0003) T1112 Store configuration at HKCU\Software\Rmc-<VictimID>.
Discovery (TA0007) T1082 Collects host information after execution (UID, timestamp, paths).
Collection (TA0009) T1056.001 Keylogging module
Collection (TA0009) T1113 Threads for screenshot capture.
Collection (TA0009) T1115 Clipboard monitoring thread initialized.
Command and Control (TA0011) T1071.004 Outbound connection to attacker-controlled server

 

Authors
Prashil Moon

Rumana Siddiqui

 Previous PostOperation FrostBeacon: Multi-Cluster Cobalt Strike Campaign Targe...
Prashil Moon

About Prashil Moon

Prashil is a Senior Security Researcher at Quick Heal Security Labs. He enthusiastically keeps hunting for ongoing malware trends, runs analysis on malware...

Articles by Prashil Moon »

Related Posts

  • Operation FrostBeacon: Multi-Cluster Cobalt Strike Campaign Targets Russia

    Operation FrostBeacon: Multi-Cluster Cobalt Strike Campaign Targets Russia

    December 8, 2025
  • Operation DupeHike : UNG0902 targets Russian employees with DUPERUNNER and AdaptixC2

    Operation DupeHike : UNG0902 targets Russian employees with DUPERUNNER and AdaptixC2

    December 3, 2025
  • Operation Hanoi Thief: Threat Actor targets Vietnamese IT professionals and recruitment teams.

    Operation Hanoi Thief: Threat Actor targets Vietnamese IT professionals and recruitment teams.

    November 28, 2025
Featured Authors
  • Seqrite
    Seqrite

    Seqrite is a leading enterprise cybersecurity solutions provider. With a focus...

    Read more..
  • Jyoti Karlekar
    Jyoti Karlekar

    I'm an avid writer who enjoys crafting content about emerging technologies and...

    Read more..
  • Bineesh P
    Bineesh P

    I am a passionate cybersecurity enthusiast and a dedicated writer. With a knack...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
Topics
apt (25) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (15) Cybersecurity (334) cyber security (34) Cyber threat (33) cyber threats (50) data breach (56) data breaches (29) data loss (28) data loss prevention (33) data privacy (14) data protection (30) data security (15) DLP (49) DPDP (13) DPDPA (13) Encryption (16) endpoint security (110) Enterprise security (18) Exploit (13) GDPR (13) malware (76) malware analysis (13) malware attack (23) malware attacks (12) MDM (27) Microsoft (15) Network security (24) Patch Management (12) phishing (29) Ransomware (69) ransomware attack (30) ransomware attacks (30) ransomware protection (14) Seqrite (40) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) Threat Intelligence (13) UTM (34) Vulnerability (16) zero trust (13)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies