Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

Remcos

7
Global rank
13 infographic chevron month
Month rank
15 infographic chevron week
Week rank
0
IOCs

Remcos is a commercially distributed remote administration and surveillance tool that has been widely observed in unauthorized deployments, where threat actors use it to perform remote actions on compromised machines. It is actively maintained by its vendor, with new versions and feature updates released on a frequent, near-monthly basis.

Remote access tool
Type
Unknown
Origin
1 June, 2016
First seen
17 December, 2025
Last seen

How to analyze Remcos with ANY.RUN

Remote access tool
Type
Unknown
Origin
1 June, 2016
First seen
17 December, 2025
Last seen

IOCs

IP addresses
178.124.140.143
115.186.136.237
91.192.100.48
84.38.135.152
62.102.148.166
62.102.148.130
91.192.100.12
62.102.148.160
185.156.174.115
193.161.193.99
217.69.139.243
91.192.100.9
184.75.221.171
91.192.100.41
154.16.63.197
213.152.161.30
185.29.9.103
185.125.205.91
77.48.28.227
213.152.162.181
Hashes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logisctismes.duckdns.org
0.tcp.ngrok.io
cashout2018.ddnss.de
bobo231.hopto.org
office365update.duckdns.org
plunder.nsupdate.info
remcoss.onmypc.org
wiskiriski15.duckdns.org
marklogs.ddns.me
systen32.ddns.net
muhoste.ddnsfree.com
2ffahbg8eydhr96hx3x2lje2ymygt5iq.duckdns.org
camtakeit.ddns.net
cfo111.duckdns.org
cfo1111.ddns.net
cfo1111.hopto.org
remco102.duckdns.org
remco101.duckdns.org
xyzeeeee.duckdns.org
www.rmagent.biz
URLs
http://77.91.124.20/store/games/Plugins/cred64.dll
http://p4-preview.runhosting.com/breakingsec02.co.nf/Remcos/upd_free.txt
http://p4-preview.runhosting.com/breakingsec02.co.nf/Remcos/logaccess.php
http://p4-preview.runhosting.com/breakingsec02.co.nf/Remcos/login.php
http://p4-preview.runhosting.com/breakingsec02.co.nf/Remcos/OnlineCheck-v4.php
http://94.156.69.174:7459/
http://170.205.31.90:3333/
Last Seen at

Recent blog posts

post image
5 Ways Threat Intelligence Drives ROI in SOCs...
watchers 142
comments 0
post image
SOC Leader’s Playbook: 3 Practical Steps to F...
watchers 283
comments 0
post image
AI Sigma Rules: Scale Threat Detection, Drive...
watchers 4626
comments 0

What is Remcos?

Remcos is a commercially distributed remote administration and surveillance tool developed and marketed by Breaking Security, a company registered in Hong Kong. The tool is advertised for legitimate purposes including remote device management, authorized penetration testing, security audits, and approved remote administration.

However, security researchers and threat intelligence organizations have extensively documented abuse of Remcos by unauthorized threat actors in numerous phishing campaigns, espionage operations, and targeted attacks against critical infrastructure, government agencies, and commercial organizations.

Remcos: Technical details

Remcos has been available since 2016 and receives active updates with new releases documented nearly every month. The tool is sold through legitimate commercial channels.

The software is equipped with features commonly found in remote administration tools, such as remote desktop control, file management, keystroke logging, and screenshot capabilities. These same technical capabilities have made it an effective tool for malicious deployment by threat actors when installed without authorization.

Unauthorized deployments of Remcos employ multiple delivery techniques in phishing campaigns. Threat actors have been observed distributing Remcos through deceptive executable files with names designed to appear legitimate, as well as through Microsoft Office documents that exploit application vulnerabilities to facilitate remote payload download and execution. Such cases also involve the use of anti-analysis techniques and code obfuscation to evade detection by security software.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

Remcos analysis in a malware sandbox

ANY.RUN’s Interactive Sandbox provides a safe, cloud-based environment for detonating programs and URLs to detect the presence of malicious activity.

ANY.RUN sandbox analysis of an unauthorized Remcos deployment documents the following execution chain:

  • Following initial compromise through phishing vectors, observed samples initiated Visual Basic Script (VBS) execution, which spawned command-line processes to download and execute the primary Remcos payload.

process graph of the Remcos execution Figure 1: Displays the lifecycle of an unauthorized Remcos use as presented by a visual graph generated by ANY.RUN

  • Post-execution behaviors documented in threat intelligence include information collection activities, registry modification to establish persistence mechanisms, and command-and-control (C2) server communication to enable remote operator control.
  • These execution patterns are consistent with documented threat actor campaigns using Remcos for unauthorized access and data collection operations.

text report 0f the Remcos trojan analysis Figure 2: A customizable text report generated by ANY.RUN is a feature specifically developed to simplify the sharing of analysis results.

How to detect Remcos using ANY.RUN’s Interactive Sandbox?

Security analysts can identify unauthorized Remcos deployments through registry artifact analysis. Threat actors deploying Remcos have been observed creating registry entries in the user hive containing identifying markers.

remcos log file Figure 3: Remcos registry changes analysis

When analyzing suspicious processes in ANY.RUN’s Interactive Sandbox, examiners can review registry modification events by selecting the process and accessing the detailed information view. The presence of registry keys matching the pattern "HKEY_CURRENT_USER\Software\Remcos-{digits_letters}" is a strong indicator of unauthorized Remcos deployment and can be used as a forensic artifact for detection and incident response.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Gathering Threat Intelligence on Remcos Deployments

Security teams can collect up-to-date intelligence on unauthorized Remcos deployments using ANY.RUN’s Threat Intelligence Lookup.

The service provides access to a centralized repository of millions of IOCs, IOAs, and IOBs extracted from live interactive malware analysis sessions conducted in the ANY.RUN Sandbox by a community of 500,000+ researchers and 15,000 SOCs.

With 40+ customizable search parameters—including file hashes, IPs, domains, command lines, registry paths, MITRE techniques, and process artifacts—analysts can efficiently identify and correlate Remcos-related indicators across sandbox sessions.

Remcos ANY.RUN Figure 4: Search results for Remcos in Threat Intelligence Lookup

For example, you can search directly for the threat name or use related indicators like hash values or network connections. Submitting a query such as threatName:"remcos" AND domainName:"" will generate a list of files, events, domain names, and other data extracted from Remcos samples along with sandbox sessions that you can explore in detail to gain comprehensive insights into this malware’s behavior.

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Remcos Deployment Methods in Malicious Campaigns

Threat intelligence reports document multiple distribution vectors for unauthorized Remcos deployments, including bundling with mass mailing tools marketed as legitimate distribution services. Analysis of phishing campaigns reveals that Remcos payloads most frequently arrive via malicious email attachments, with threat actors employing social engineering lures to prompt users to enable macros in Microsoft Office documents.

A common attack chain:

  • Phishing emails with deceptive lures targeting specific industries (news media, energy sector)
  • Office documents requiring macro activation to initiate payload reconstruction
  • Dropper execution in standard locations (%APPDATA%, %TEMP%)
  • Secondary download of primary Remcos payload from actor-controlled infrastructure

Once macros are enabled, the reconstructed executable downloads and launches the Remcos component, establishing persistence and C2 communication as documented in sandbox executions.

Conclusion

Unauthorized deployments of Remcos represent a significant security concern, as threat actors can obtain access to feature-rich remote access capabilities at relatively low cost and leverage them to manage compromised hosts at scale. When abused in this way, Remcos has been used to create and control networks of infected devices, exfiltrate data, and maintain long-term access in support of broader malicious campaigns.

Fortunately, modern analysis and threat intelligence solutions provide security teams with extensive capabilities to investigate suspicious samples, observe execution behavior, and enrich indicators related to Remcos-based activity. Interactive sandboxing and integrated threat intelligence from ANY.RUN enable analysts to safely analyze suspected Remcos deployments, correlate them with known campaigns, and implement effective countermeasures across their environments.

Create an ANY.RUN account to start your first investigation!

HAVE A LOOK AT

Cephalus screenshot
Cephalus
cephalus
Cephalus is a targeted ransomware threat discovered in 2025. It’s known for infiltrating organizations that deal with sensitive data through compromised RDP access. It leverages DLL sideloading with a legitimate SentinelOne executable. Cephalus is able to exfiltrate data and destroy backup options. Its payload is also tailored to each victim, which makes identification and mitigation more complex.
Read More
Cactus Ransomware screenshot
Cactus ransomware-as-a-service (RaaS) was first caught in March 2023 targeting corporate networks. It became known for its self-encrypting payload and double extortion tactics. Cactus primarily targets large enterprises across industries in finance, manufacturing, IT, and healthcare. It is known for using custom encryption techniques, remote access tools, and penetration testing frameworks to maximize damage.
Read More
PureCrypter screenshot
PureCrypter
purecrypter
First identified in March 2021, PureCrypter is a .NET-based loader that employs obfuscation techniques, such as SmartAssembly, to evade detection. It has been used to distribute malware families including AgentTesla, RedLine Stealer, and SnakeKeylogger. The malware is typically delivered through phishing campaigns and malicious downloads, often masquerading as legitimate files with extensions like .mp4 or .pdf. PureCrypter utilizes encryption and compression to conceal its payloads and can inject malicious code into legitimate processes to maintain persistence on the infected system.
Read More
Botnet screenshot
Botnet
botnet
A botnet is a group of internet-connected devices that are controlled by a single individual or group, often without the knowledge or consent of the device owners. These devices can be used to launch a variety of malicious attacks, such as distributed denial-of-service (DDoS) attacks, spam campaigns, and data theft. Botnet malware is the software that is used to infect devices and turn them into part of a botnet.
Read More
SSLoad screenshot
SSLoad
ssload
SSLoad is a malicious loader or downloader that is used to infiltrate target systems through phishing emails, perform reconnaissance and transmit it back to its operators delivering malicious payloads. To avoid detection, SSLoad employs various encryption methods and delivery techniques highlighting its versatile nature and complexity. It is believed to be a part of Malware-as-a-Service (MaaS) operation given its diverse delivery methods and implemented techniques.
Read More
WannaCry screenshot
WannaCry
wannacry ransomware
WannaCry is a famous Ransomware that utilizes the EternalBlue exploit. This malware is known for infecting at least 200,000 computers worldwide and it continues to be an active and dangerous threat.
Read More