Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

Remcos

9
Global rank
9 infographic chevron month
Month rank
10
Week rank
0
IOCs

Remcos is a commercially distributed remote administration and surveillance tool that has been widely observed in unauthorized deployments, where threat actors use it to perform remote actions on compromised machines. It is actively maintained by its vendor, with new versions and feature updates released on a frequent, near-monthly basis.

Remote access tool
Type
Unknown
Origin
1 June, 2016
First seen
3 February, 2026
Last seen

How to analyze Remcos with ANY.RUN

Remote access tool
Type
Unknown
Origin
1 June, 2016
First seen
3 February, 2026
Last seen

IOCs

IP addresses
178.124.140.143
115.186.136.237
91.192.100.48
84.38.135.152
62.102.148.166
62.102.148.130
91.192.100.12
62.102.148.160
185.156.174.115
193.161.193.99
217.69.139.243
91.192.100.9
184.75.221.171
91.192.100.41
154.16.63.197
213.152.161.30
185.29.9.103
185.125.205.91
77.48.28.227
213.152.162.181
Hashes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logisctismes.duckdns.org
0.tcp.ngrok.io
cashout2018.ddnss.de
bobo231.hopto.org
office365update.duckdns.org
plunder.nsupdate.info
remcoss.onmypc.org
wiskiriski15.duckdns.org
marklogs.ddns.me
systen32.ddns.net
muhoste.ddnsfree.com
2ffahbg8eydhr96hx3x2lje2ymygt5iq.duckdns.org
camtakeit.ddns.net
cfo111.duckdns.org
cfo1111.ddns.net
cfo1111.hopto.org
remco102.duckdns.org
remco101.duckdns.org
xyzeeeee.duckdns.org
www.rmagent.biz
URLs
http://77.91.124.20/store/games/Plugins/cred64.dll
http://p4-preview.runhosting.com/breakingsec02.co.nf/Remcos/upd_free.txt
http://p4-preview.runhosting.com/breakingsec02.co.nf/Remcos/logaccess.php
http://p4-preview.runhosting.com/breakingsec02.co.nf/Remcos/login.php
http://p4-preview.runhosting.com/breakingsec02.co.nf/Remcos/OnlineCheck-v4.php
http://94.156.69.174:7459/
http://170.205.31.90:3333/
Last Seen at

Recent blog posts

post image
Enterprise Phishing: How Attackers Abuse Micr...
watchers 63
comments 0
post image
SOC & Business Success with ANY.RUN: Real...
watchers 2063
comments 0
post image
Attackers Are Taking Over Real Email Threads...
watchers 5210
comments 0

What is Remcos?

Remcos is a commercially distributed remote administration and surveillance tool developed and marketed by Breaking Security, a company registered in Hong Kong. The tool is advertised for legitimate purposes including remote device management, authorized penetration testing, security audits, and approved remote administration.

However, security researchers and threat intelligence organizations have extensively documented abuse of Remcos by unauthorized threat actors in numerous phishing campaigns, espionage operations, and targeted attacks against critical infrastructure, government agencies, and commercial organizations.

Remcos: Technical details

Remcos has been available since 2016 and receives active updates with new releases documented nearly every month. The tool is sold through legitimate commercial channels.

The software is equipped with features commonly found in remote administration tools, such as remote desktop control, file management, keystroke logging, and screenshot capabilities. These same technical capabilities have made it an effective tool for malicious deployment by threat actors when installed without authorization.

Unauthorized deployments of Remcos employ multiple delivery techniques in phishing campaigns. Threat actors have been observed distributing Remcos through deceptive executable files with names designed to appear legitimate, as well as through Microsoft Office documents that exploit application vulnerabilities to facilitate remote payload download and execution. Such cases also involve the use of anti-analysis techniques and code obfuscation to evade detection by security software.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

Remcos analysis in a malware sandbox

ANY.RUN’s Interactive Sandbox provides a safe, cloud-based environment for detonating programs and URLs to detect the presence of malicious activity.

ANY.RUN sandbox analysis of an unauthorized Remcos deployment documents the following execution chain:

  • Following initial compromise through phishing vectors, observed samples initiated Visual Basic Script (VBS) execution, which spawned command-line processes to download and execute the primary Remcos payload.

process graph of the Remcos execution Figure 1: Displays the lifecycle of an unauthorized Remcos use as presented by a visual graph generated by ANY.RUN

  • Post-execution behaviors documented in threat intelligence include information collection activities, registry modification to establish persistence mechanisms, and command-and-control (C2) server communication to enable remote operator control.
  • These execution patterns are consistent with documented threat actor campaigns using Remcos for unauthorized access and data collection operations.

text report 0f the Remcos trojan analysis Figure 2: A customizable text report generated by ANY.RUN is a feature specifically developed to simplify the sharing of analysis results.

How to detect Remcos using ANY.RUN’s Interactive Sandbox?

Security analysts can identify unauthorized Remcos deployments through registry artifact analysis. Threat actors deploying Remcos have been observed creating registry entries in the user hive containing identifying markers.

remcos log file Figure 3: Remcos registry changes analysis

When analyzing suspicious processes in ANY.RUN’s Interactive Sandbox, examiners can review registry modification events by selecting the process and accessing the detailed information view. The presence of registry keys matching the pattern "HKEY_CURRENT_USER\Software\Remcos-{digits_letters}" is a strong indicator of unauthorized Remcos deployment and can be used as a forensic artifact for detection and incident response.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Gathering Threat Intelligence on Remcos Deployments

Security teams can collect up-to-date intelligence on unauthorized Remcos deployments using ANY.RUN’s Threat Intelligence Lookup.

The service provides access to a centralized repository of millions of IOCs, IOAs, and IOBs extracted from live interactive malware analysis sessions conducted in the ANY.RUN Sandbox by a community of 500,000+ researchers and 15,000 SOCs.

With 40+ customizable search parameters—including file hashes, IPs, domains, command lines, registry paths, MITRE techniques, and process artifacts—analysts can efficiently identify and correlate Remcos-related indicators across sandbox sessions.

Remcos ANY.RUN Figure 4: Search results for Remcos in Threat Intelligence Lookup

For example, you can search directly for the threat name or use related indicators like hash values or network connections. Submitting a query such as threatName:"remcos" AND domainName:"" will generate a list of files, events, domain names, and other data extracted from Remcos samples along with sandbox sessions that you can explore in detail to gain comprehensive insights into this malware’s behavior.

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Remcos Deployment Methods in Malicious Campaigns

Threat intelligence reports document multiple distribution vectors for unauthorized Remcos deployments, including bundling with mass mailing tools marketed as legitimate distribution services. Analysis of phishing campaigns reveals that Remcos payloads most frequently arrive via malicious email attachments, with threat actors employing social engineering lures to prompt users to enable macros in Microsoft Office documents.

A common attack chain:

  • Phishing emails with deceptive lures targeting specific industries (news media, energy sector)
  • Office documents requiring macro activation to initiate payload reconstruction
  • Dropper execution in standard locations (%APPDATA%, %TEMP%)
  • Secondary download of primary Remcos payload from actor-controlled infrastructure

Once macros are enabled, the reconstructed executable downloads and launches the Remcos component, establishing persistence and C2 communication as documented in sandbox executions.

Conclusion

Unauthorized deployments of Remcos represent a significant security concern, as threat actors can obtain access to feature-rich remote access capabilities at relatively low cost and leverage them to manage compromised hosts at scale. When abused in this way, Remcos has been used to create and control networks of infected devices, exfiltrate data, and maintain long-term access in support of broader malicious campaigns.

Fortunately, modern analysis and threat intelligence solutions provide security teams with extensive capabilities to investigate suspicious samples, observe execution behavior, and enrich indicators related to Remcos-based activity. Interactive sandboxing and integrated threat intelligence from ANY.RUN enable analysts to safely analyze suspected Remcos deployments, correlate them with known campaigns, and implement effective countermeasures across their environments.

Create an ANY.RUN account to start your first investigation!

HAVE A LOOK AT

Havoc screenshot
Havoc
havoc
Havoc is an advanced post-exploitation framework used by hackers to take control of a system once they've breached it. With Havoc, attackers can run commands remotely, inject malicious processes, and access sensitive data. It's often used in targeted attacks, allowing cybercriminals to stay hidden in a network while stealing information or launching further attacks. Its flexibility and ability to bypass detection make it a serious threat, especially in environments that rely on traditional security tools.
Read More
Netwalker screenshot
Netwalker
netwalker ransomware
Netwalker is ransomware — it belongs to a malware family which encrypts files and demands users to pay a ransom to get their data back. Netwalker utilizes several sophisticated techniques, such as process hollowing and code obfuscation to target corporate victims.
Read More
BTMOB RAT screenshot
BTMOB RAT
btmob
BTMOB RAT is a remote access Trojan (RAT) designed to give attackers full control over infected devices. It targets Windows and Android endpoints. Its modular structure allows operators to tailor capabilities, making it suitable for espionage, credential theft, financial fraud, and establishing long-term footholds in corporate networks.
Read More
Stealer screenshot
Stealer
stealer
Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.
Read More
Balada Injector screenshot
Balada Injector is a long-running malware campaign that targets WordPress websites by exploiting vulnerabilities in plugins and themes. The attackers inject malicious code into compromised sites, leading to unauthorized redirects, data theft, and the creation of [backdoors](https://any.run/malware-trends/backdoor) for persistent access. The campaign operates in waves, with spikes in activity observed every few weeks, continually adapting to exploit newly discovered vulnerabilities.
Read More
Tykit screenshot
Tykit
tykit
Tykit is a sophisticated phishing-as-a-service (PhaaS) kit that emerged in May 2025, designed to steal Microsoft 365 corporate credentials through an innovative attack vector: malicious SVG files.
Read More