BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details
9
Global rank
3 infographic chevron month
Month rank
4 infographic chevron week
Week rank
2715
IOCs

Remcos is a RAT type malware that attackers use to perform actions on infected machines remotely. This malware is extremely actively caped up to date with updates coming out almost every single month.

Trojan
Type
ex-USSR territory
Origin
1 June, 2016
First seen
27 July, 2024
Last seen

How to analyze Remcos with ANY.RUN

Type
ex-USSR territory
Origin
1 June, 2016
First seen
27 July, 2024
Last seen

IOCs

IP addresses
178.23.190.118
81.19.139.74
204.10.160.230
212.162.149.42
104.250.180.178
107.175.229.139
172.93.218.178
94.156.69.174
103.186.116.90
209.90.234.13
185.196.9.78
45.95.169.135
178.33.57.155
213.5.130.58
91.223.3.151
185.29.9.110
46.183.218.150
194.59.31.5
45.88.186.15
206.217.141.246
Hashes
03541b2cf3bf022eda584b9ead6b6edeb7a47e8ccaa99b2415ee56694c9868cb
2e5b8a1ed53e25c5ddd9b7cd97b86627baf197a7e3893909bcf33360beda2f71
d72b9f4910cbe10f8d1b3eeb7096f26412fce2b735c9929c354d8f20265aba50
593cf342a669fcb1bff594bd8ce85fc112bc19d42f7fcb0932c9ac5cdf70d0d9
2ebf1aed428b35603a907ec88f9172c89eaa08e45070582f4995988f5c6ca8c4
7cab170002b5372d67add0e7c53e0cf620f33620391efd81c16e1d2000300bbf
71551d17db59a2ad36d75a15b0b0a84444c2b0e3de1309f14ac8abb305d26b32
dfe0f95ffc9ad74d75e0c2089a34fd96594e47b9c635eb5c884cec8f1d20ef0a
a5a88cbc89b94a0c071a828120d7247b72135d881b0d06efa2d114b988b41c36
7fd1e285f1e5ce2a63513d7122f54b4c02bec1645aab6ae3b74139a60805bd4c
28772d5ba55a0f978e807fbd8d0dfc0ffbb2beec150868596455c93b04a01890
a8ae7002d16df08878c864f8cd2f8722dfcb5950372f3b12c88f4e265f2eee40
2e4c6cc30705e1398ea19d064bd7cfba58448798a81f3c89b86fa66750904a7b
f125e58bcea173dc1aa5a9498dfa18ddd1a69fbd431610df034af7af78bd602e
5e95168687b15de3724b3c8240c0b40cdb61c75b440d11a7fa72c2b247c920ae
85420ddd075768164031bf43563925bff88c5b298d7924ca95fe1cb0519dd76b
34c7377e5b187edf6d660e7df34b68b968940b6de1399c2f4a3e5675099139f4
43d2a1081b1fba2cee356ff5e0981d2f09900ef1b0b5f487ca0b3e96c8d11c28
50c55b209d899514903835fbded92e680b34cd34e24aac9d3919522c42b543d4
45e734bc929bdefeaa6f09ba766b8ef86ca2af2b8534ca756420e6c5a39413f3
Domains
logisctismes.duckdns.org
muchodinerohoy.con-ip.com
julio25.con-ip.com
maveing.duckdns.org
2024remcmon.duckdns.org
latestgrace2024.duckdns.org
nnamoo.duckdns.org
zuesremmy.duckdns.org
december2nd.ddns.net
december2n.duckdns.org
method8888.ddns.net
renovar.con-ip.com
card25.con-ip.com
vegetachcnc.com
bossnacarpet.com
delamanodedios7.con-ip.com
julio24.con-ip.com
rungmotors20.ddns.net
manuelabobadillalora09.con-ip.com
oijdwe820b397gdb3n298rd2.con-ip.com
URLs
http://94.156.69.174:7459/
http://p4-preview.runhosting.com/breakingsec02.co.nf/Remcos/logaccess.php
http://p4-preview.runhosting.com/breakingsec02.co.nf/Remcos/OnlineCheck-v4.php
http://p4-preview.runhosting.com/breakingsec02.co.nf/Remcos/upd_free.txt
http://p4-preview.runhosting.com/breakingsec02.co.nf/Remcos/login.php
Last Seen at

Recent blog posts

post image
See Malicious Process Relationships on a Vis...
watchers 178
comments 0
post image
Brute Ratel C4 Badger Used to Load Latrodectu...
watchers 1013
comments 0
post image
Find Threats Exploiting CrowdStrike Outage w...
watchers 3000
comments 0

What is Remcos trojan?

Remcos is a remote access trojan – a malware used to take remote control over infected PCs. This malicious software has been operational since 2016 when it first became available for sale in the underground hacker communities on the dark web.

Remcos RAT has been receiving substantial updates throughout its lifetime. In fact, this malware is being maintained extremely actively, with new releases coming out almost every month. In April 2019, the malware was available for purchase for as little as just over 60 dollars up to over 400 dollars depending on the selected package.

In Q2 2024, Remcos was named the second most popular malware according to ANY.RUN's report on the current threat landscape.

General description of Remcos trojan

This trojan is created and sold to clients by a “business” called Breaking Security. Although Breaking Security promises that the program is only available to those who intend to use it for legal purposes, in reality, Remcos RAT gives clients all necessary features to launch potentially destructive attacks. The malware can be purchased with different cryptocurrencies. The program can remotely control PCs with any Windows OS, including XP and newer. It can also capture screenshots, record keystrokes on infected machines, and send the collected information to host servers.

What’s more, it comes equipped with a crypto program that enables the malware to stay hidden from antivirus software. In fact, Breaking Security has released a video on its YouTube channel which demonstrates the analysis of how multiple antiviruses fail to detect the presence of the Remcos RAT. In addition, Breaking Security provides attackers with a keylogger that can be used to remotely record keystrokes of the victim, a mass mailer program that can be used to carry out distribution campaigns, and a DynDNS service with a client-server connection. With all additional services combined, purchasers gain all they need to create their own functioning botnets.

The company responsible for selling Remcos RAT to the criminals is registered in Germany. Germany is the only country out of all European Union members that do not allow looking up company details online. Therefore founders of Breaking Security are still not identified. The website itself does not provide any information about the company or the team behind Remcos. The domain name of the website itself is hosted on Cloudflare, and all information related to it is protected by the privacy policy of the hosting organization. Clearly, the people behind Breaking Security have taken a lot of effort to stay anonymous.

Get started today for free

Easily analyze emerging malware with ANY.RUN interactive online sandbox

Register for free

Remcos malware analysis

Remcos RAT execution and analysis can be watched in-depth in a video recorded in the ANY.RUN malware hunting service. Moreover, you can also research other malicious families there such as AZORult and Adwind.

process graph of the Remcos execution Figure 1: Displays the lifecycle of Remcos as presented by a visual graph generated by ANY.RUN

text report 0f the Remcos trojan analysis Figure 2: A customizable text report generated by ANY.RUN is a feature specifically developed to simplify the sharing of analysis results.

Remcos trojan execution process

Remcos trojan can be delivered in different forms. Based on RAT's analysis, it can be spread as an executable file with the name that should convince users to open it, or it pretends to be a Microsoft Word file that exploits vulnerabilities to download and execute the main payload, obfuscate the server component.

In our analysis, after Remcos made its way to infect the device and begin the execution process, it started VBS script execution. Script ran command line and proceeded to drop an executable file from it. remcos execution process tree Figure 3: Execution processes of Remcos as displayed by the ANY.RUN malware analysis service

This file was the main payload, and it carried out the main malicious activities – stealing information, changing the autorun value in the registry, and connecting to the C2 server.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Distribution of Remcos

Although being distributed using multiple methods, being provided in a bundle with mass mailer software, the analysis proves that Remcos RAT usually gets into victims’ machines through malicious attachments in spam email campaigns. The attackers normally use phishing techniques to try and trick users into downloading file attachments, commonly – contaminated Microsoft Office files. Once downloaded, the files would prompt the users to activate the macros required for the execution of Ramcos to start.

Attackers who utilize this trojan are known to target specific organizations and sometimes go a long way to craft custom phishing emails designed to fool their victims. Corporations that are known to become targets of Remcos attacks include news agencies and businesses energy industry-related businesses.

If the victim does enable the macros, they reconstruct a small executable file which is then dropped to a pre-specified location and launched from there. This file then proceeds to download the main payload, which is Remcos itself, from a control server and then begin the execution process. Even though the location can vary from sample to sample, it usually includes one of the following locations, typical for malware creators: %APPDATA% and %TEMP%.

How to detect Remcos using ANY.RUN?

Cybersecurity specialists can easily detect Remcos – the trojan writes its name into a registry. Look at registry events: click on the process and then on the More Info button. If the Registry changes tab has a key like "HKEY_CURRENT_USER\Software\Remcos-{digits_letters}", you can be sure it’s Remcos.

remcos log file Figure 4: Remcos registry changes analysis

Conclusion

Remcos RAT is a dangerous trojan available to attackers for a relatively low price. Despite its accessibility, it comes equipped with enough robust features to allow attackers to set up their own effective botnets. What's more, it is modernized with updates released nearly every month by the owner company. Accessibility and powerful feature set helped to make Ramcos into a powerful and dangerous trojan.

Thankfully, malware hunting services such as ANY.RUN gives professionals an equally robust feature set to research threats like Ramcos and respond with effective countermeasures.

Create your free ANY.RUN account to analyze malware and phishing without limits!

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More