Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

Remcos

7
Global rank
13 infographic chevron month
Month rank
15
Week rank
0
IOCs

Remcos is a commercially distributed remote administration and surveillance tool that has been widely observed in unauthorized deployments, where threat actors use it to perform remote actions on compromised machines. It is actively maintained by its vendor, with new versions and feature updates released on a frequent, near-monthly basis.

Remote access tool
Type
Unknown
Origin
1 June, 2016
First seen
24 December, 2025
Last seen

How to analyze Remcos with ANY.RUN

Remote access tool
Type
Unknown
Origin
1 June, 2016
First seen
24 December, 2025
Last seen

IOCs

IP addresses
178.124.140.143
115.186.136.237
91.192.100.48
84.38.135.152
62.102.148.166
62.102.148.130
91.192.100.12
62.102.148.160
185.156.174.115
193.161.193.99
217.69.139.243
91.192.100.9
184.75.221.171
91.192.100.41
154.16.63.197
213.152.161.30
185.29.9.103
185.125.205.91
77.48.28.227
213.152.162.181
Hashes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logisctismes.duckdns.org
0.tcp.ngrok.io
cashout2018.ddnss.de
bobo231.hopto.org
office365update.duckdns.org
plunder.nsupdate.info
remcoss.onmypc.org
wiskiriski15.duckdns.org
marklogs.ddns.me
systen32.ddns.net
muhoste.ddnsfree.com
2ffahbg8eydhr96hx3x2lje2ymygt5iq.duckdns.org
camtakeit.ddns.net
cfo111.duckdns.org
cfo1111.ddns.net
cfo1111.hopto.org
remco102.duckdns.org
remco101.duckdns.org
xyzeeeee.duckdns.org
www.rmagent.biz
URLs
http://77.91.124.20/store/games/Plugins/cred64.dll
http://p4-preview.runhosting.com/breakingsec02.co.nf/Remcos/upd_free.txt
http://p4-preview.runhosting.com/breakingsec02.co.nf/Remcos/logaccess.php
http://p4-preview.runhosting.com/breakingsec02.co.nf/Remcos/login.php
http://p4-preview.runhosting.com/breakingsec02.co.nf/Remcos/OnlineCheck-v4.php
http://94.156.69.174:7459/
http://170.205.31.90:3333/
Last Seen at

Recent blog posts

post image
Year in Review by ANY.RUN: Key Threats, Solut...
watchers 3081
comments 0
post image
5 Ways Threat Intelligence Drives ROI in SOCs...
watchers 554
comments 0
post image
SOC Leader’s Playbook: 3 Practical Steps to F...
watchers 557
comments 0

What is Remcos?

Remcos is a commercially distributed remote administration and surveillance tool developed and marketed by Breaking Security, a company registered in Hong Kong. The tool is advertised for legitimate purposes including remote device management, authorized penetration testing, security audits, and approved remote administration.

However, security researchers and threat intelligence organizations have extensively documented abuse of Remcos by unauthorized threat actors in numerous phishing campaigns, espionage operations, and targeted attacks against critical infrastructure, government agencies, and commercial organizations.

Remcos: Technical details

Remcos has been available since 2016 and receives active updates with new releases documented nearly every month. The tool is sold through legitimate commercial channels.

The software is equipped with features commonly found in remote administration tools, such as remote desktop control, file management, keystroke logging, and screenshot capabilities. These same technical capabilities have made it an effective tool for malicious deployment by threat actors when installed without authorization.

Unauthorized deployments of Remcos employ multiple delivery techniques in phishing campaigns. Threat actors have been observed distributing Remcos through deceptive executable files with names designed to appear legitimate, as well as through Microsoft Office documents that exploit application vulnerabilities to facilitate remote payload download and execution. Such cases also involve the use of anti-analysis techniques and code obfuscation to evade detection by security software.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

Remcos analysis in a malware sandbox

ANY.RUN’s Interactive Sandbox provides a safe, cloud-based environment for detonating programs and URLs to detect the presence of malicious activity.

ANY.RUN sandbox analysis of an unauthorized Remcos deployment documents the following execution chain:

  • Following initial compromise through phishing vectors, observed samples initiated Visual Basic Script (VBS) execution, which spawned command-line processes to download and execute the primary Remcos payload.

process graph of the Remcos execution Figure 1: Displays the lifecycle of an unauthorized Remcos use as presented by a visual graph generated by ANY.RUN

  • Post-execution behaviors documented in threat intelligence include information collection activities, registry modification to establish persistence mechanisms, and command-and-control (C2) server communication to enable remote operator control.
  • These execution patterns are consistent with documented threat actor campaigns using Remcos for unauthorized access and data collection operations.

text report 0f the Remcos trojan analysis Figure 2: A customizable text report generated by ANY.RUN is a feature specifically developed to simplify the sharing of analysis results.

How to detect Remcos using ANY.RUN’s Interactive Sandbox?

Security analysts can identify unauthorized Remcos deployments through registry artifact analysis. Threat actors deploying Remcos have been observed creating registry entries in the user hive containing identifying markers.

remcos log file Figure 3: Remcos registry changes analysis

When analyzing suspicious processes in ANY.RUN’s Interactive Sandbox, examiners can review registry modification events by selecting the process and accessing the detailed information view. The presence of registry keys matching the pattern "HKEY_CURRENT_USER\Software\Remcos-{digits_letters}" is a strong indicator of unauthorized Remcos deployment and can be used as a forensic artifact for detection and incident response.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Gathering Threat Intelligence on Remcos Deployments

Security teams can collect up-to-date intelligence on unauthorized Remcos deployments using ANY.RUN’s Threat Intelligence Lookup.

The service provides access to a centralized repository of millions of IOCs, IOAs, and IOBs extracted from live interactive malware analysis sessions conducted in the ANY.RUN Sandbox by a community of 500,000+ researchers and 15,000 SOCs.

With 40+ customizable search parameters—including file hashes, IPs, domains, command lines, registry paths, MITRE techniques, and process artifacts—analysts can efficiently identify and correlate Remcos-related indicators across sandbox sessions.

Remcos ANY.RUN Figure 4: Search results for Remcos in Threat Intelligence Lookup

For example, you can search directly for the threat name or use related indicators like hash values or network connections. Submitting a query such as threatName:"remcos" AND domainName:"" will generate a list of files, events, domain names, and other data extracted from Remcos samples along with sandbox sessions that you can explore in detail to gain comprehensive insights into this malware’s behavior.

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Remcos Deployment Methods in Malicious Campaigns

Threat intelligence reports document multiple distribution vectors for unauthorized Remcos deployments, including bundling with mass mailing tools marketed as legitimate distribution services. Analysis of phishing campaigns reveals that Remcos payloads most frequently arrive via malicious email attachments, with threat actors employing social engineering lures to prompt users to enable macros in Microsoft Office documents.

A common attack chain:

  • Phishing emails with deceptive lures targeting specific industries (news media, energy sector)
  • Office documents requiring macro activation to initiate payload reconstruction
  • Dropper execution in standard locations (%APPDATA%, %TEMP%)
  • Secondary download of primary Remcos payload from actor-controlled infrastructure

Once macros are enabled, the reconstructed executable downloads and launches the Remcos component, establishing persistence and C2 communication as documented in sandbox executions.

Conclusion

Unauthorized deployments of Remcos represent a significant security concern, as threat actors can obtain access to feature-rich remote access capabilities at relatively low cost and leverage them to manage compromised hosts at scale. When abused in this way, Remcos has been used to create and control networks of infected devices, exfiltrate data, and maintain long-term access in support of broader malicious campaigns.

Fortunately, modern analysis and threat intelligence solutions provide security teams with extensive capabilities to investigate suspicious samples, observe execution behavior, and enrich indicators related to Remcos-based activity. Interactive sandboxing and integrated threat intelligence from ANY.RUN enable analysts to safely analyze suspected Remcos deployments, correlate them with known campaigns, and implement effective countermeasures across their environments.

Create an ANY.RUN account to start your first investigation!

HAVE A LOOK AT

Interlock screenshot
Interlock
interlock
Interlock is a relatively recent entrant into the ransomware landscape. First identified in 2023, it's a multi-functional malware strain used in ransomware-as-a-service (RaaS) operations.
Read More
Keylogger screenshot
Keylogger
keylogger
A keylogger is a type of spyware that infects a system and has the ability to record every keystroke made on the device. This lets attackers collect personal information of victims, which may include their online banking credentials, as well as personal conversations. The most widespread vector of attack leading to a keylogger infection begins with a phishing email or link. Keylogging is also often present in remote access trojans as part of an extended set of malicious tools.
Read More
Stealc screenshot
Stealc
stealc
Stealc is a stealer malware that targets victims’ sensitive data, which it exfiltrates from browsers, messaging apps, and other software. The malware is equipped with advanced features, including fingerprinting, control panel, evasion mechanisms, string obfuscation, etc. Stealc establishes persistence and communicates with its C2 server through HTTP POST requests.
Read More
Crocodilus screenshot
Crocodilus
crocodilus
Crocodilus is a highly sophisticated Android banking Trojan that emerged in March 2025, designed for full device takeover. Disguised as legitimate apps, it steals banking credentials, cryptocurrency wallet data, and enables remote control, rapidly evolving into a global threat targeting financial users across Europe, South America, and Asia.
Read More
Virlock screenshot
Virlock
virlock
Virlock is a unique ransomware strain that combines encryption capabilities with file infection techniques. First observed in 2014, it stands out due to its polymorphic nature and ability to embed its code into compromised files, ensuring continued propagation. Once it infects a system, it encrypts files and locks the screen, demanding a ransom for file recovery and system access.
Read More
HijackLoader screenshot
HijackLoader
hijackloader
HijackLoader is a modular malware acting as a vehicle for distributing different types of malicious software on compromised systems. It gained prominence during the summer of 2023 and has since been used in multiple attacks against organizations from various sectors, including hospitality businesses.
Read More