BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details
10
Global rank
9 infographic chevron month
Month rank
6 infographic chevron week
Week rank
0
IOCs

Remcos is a RAT type malware that attackers use to perform actions on infected machines remotely. This malware is extremely actively caped up to date with updates coming out almost every single month.

Trojan
Type
ex-USSR territory
Origin
1 June, 2016
First seen
21 October, 2024
Last seen

How to analyze Remcos with ANY.RUN

Type
ex-USSR territory
Origin
1 June, 2016
First seen
21 October, 2024
Last seen

IOCs

IP addresses
154.216.17.141
154.216.17.185
192.3.101.137
109.248.151.107
162.251.122.111
103.161.133.119
104.250.180.178
204.10.160.167
103.124.107.115
37.252.4.208
192.3.220.30
23.95.235.18
103.186.116.30
154.216.17.14
101.99.94.69
192.3.101.29
64.188.12.208
107.175.229.139
23.84.85.170
148.113.165.11
Hashes
1267ceb4db62b39b163313547e169954e55f31be5aa5aec84c0ada071a636adf
b165a4f4b8e9c63509587832f6019f775257bd85f0c3301d96b7869ce7720a4d
a900eb6523d27fea71193f65261de63fa7352365e9a38ff5c11bd6e9b444ad61
c541e0604bbaa7d60184b7970aee6fa30f9c67cfd913d71b88548031b504f5c1
d82562a1db289dff5085aee93a4a1bf572ee1ade364205e146a42667e02404d3
f3bf68db1550c698eed65c7c8199242388a6370cb59c60375dd3c11d4f5c9043
c9ec59e23695adca831f06aca398c511cac81f2fd65c7353f14b4725791ab80a
1d0a51787f8726c44aa40f88422d01f084c4e533c2f190f4aef1696f9fd600d9
112264028268157848387579f46a7b70b4aea67c65c635f1cea9651e0e413467
2010a7e1a136a9881ba4db4beb99088ea77ea2997d36e6d1d16fc696b34fda8b
d7409c29c408de43fb4cbcfa880b436aceaf03d4ad5b39890cf518a82d4a3e25
b2fc36f6f4e72e2700737425abab14e4d75a190195c7cd8397cb9ae9761ec34b
925b3f0c28feb07eea91c36354adb0022a621bb20d1f96f3a1ad976c366893a6
5de83431b4e5e3256c48372ab7317c520b6b5c5e7adb7f642e174cb6481b8c01
e2c60159ad9908ac2a1ab446c1866dfe5a59b1535ca29f111ae56833996d82b8
a47de008d965b4432d1ac9b422db6b30adea67d6a10e1957cfd10bd4428927ab
10889504234fe600c781aefe6ba0918e2e1d98a777f6e4e03da6d006a06bffb0
e15677ab90ab5cb707c87420cb49c733d5948513cfbfd152470a03942effc9b8
d17ccb455ee24cc30f0bb0bdbfe244a388444b82ec069bb0766870b243f03695
3ad6825a9dd21472e0f07dad2df54c40e5f322f1dfd316d9e7b534b1b6311d99
Domains
logisctismes.duckdns.org
carroosmfjdjs.con-ip.com
ponscripter-29947.portmap.host
nxadafer-31488.portmap.host
wealthabundance.duckdns.org
core-hook.gl.at.ply.gg
carracalbarmen.con-ip.com
17oct.con-ip.com
adnieu83.ydns.eu
0.tcp.eu.ngrok.io
assaasjdnsubdcdy.con-ip.com
cashout2018.ddnss.de
sept2024.con-ip.com
alfredoperezpu1405.con-ip.com
extendedbreakfast.com
goatratedman.com
remmyc.duckdns.org
powerremaas.kozow.com
oijifhb490398hfuni34uifn4.con-ip.com
4.tcp.eu.ngrok.io
URLs
http://94.156.69.174:7459/
http://p4-preview.runhosting.com/breakingsec02.co.nf/Remcos/logaccess.php
http://p4-preview.runhosting.com/breakingsec02.co.nf/Remcos/OnlineCheck-v4.php
http://p4-preview.runhosting.com/breakingsec02.co.nf/Remcos/upd_free.txt
http://p4-preview.runhosting.com/breakingsec02.co.nf/Remcos/login.php
Last Seen at

Recent blog posts

post image
Malware Analysis Report in One Click
watchers 7289
comments 0
post image
Cyber Information Gathering: Techniques and T...
watchers 451
comments 0
post image
ANY.RUN’s Upgraded Linux Sandbox for Fast and...
watchers 572
comments 0

What is Remcos trojan?

Remcos is a remote access trojan – a malware used to take remote control over infected PCs. This malicious software has been operational since 2016 when it first became available for sale in the underground hacker communities on the dark web.

Remcos RAT has been receiving substantial updates throughout its lifetime. In fact, this malware is being maintained extremely actively, with new releases coming out almost every month. In April 2019, the malware was available for purchase for as little as just over 60 dollars up to over 400 dollars depending on the selected package.

In Q2 2024, Remcos was named the second most popular malware according to ANY.RUN's report on the current threat landscape.

General description of Remcos trojan

This trojan is created and sold to clients by a “business” called Breaking Security. Although Breaking Security promises that the program is only available to those who intend to use it for legal purposes, in reality, Remcos RAT gives clients all necessary features to launch potentially destructive attacks. The malware can be purchased with different cryptocurrencies. The program can remotely control PCs with any Windows OS, including XP and newer. It can also capture screenshots, record keystrokes on infected machines, and send the collected information to host servers.

What’s more, it comes equipped with a crypto program that enables the malware to stay hidden from antivirus software. In fact, Breaking Security has released a video on its YouTube channel which demonstrates the analysis of how multiple antiviruses fail to detect the presence of the Remcos RAT. In addition, Breaking Security provides attackers with a keylogger that can be used to remotely record keystrokes of the victim, a mass mailer program that can be used to carry out distribution campaigns, and a DynDNS service with a client-server connection. With all additional services combined, purchasers gain all they need to create their own functioning botnets.

The company responsible for selling Remcos RAT to the criminals is registered in Germany. Germany is the only country out of all European Union members that do not allow looking up company details online. Therefore founders of Breaking Security are still not identified. The website itself does not provide any information about the company or the team behind Remcos. The domain name of the website itself is hosted on Cloudflare, and all information related to it is protected by the privacy policy of the hosting organization. Clearly, the people behind Breaking Security have taken a lot of effort to stay anonymous.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

Remcos malware analysis

Remcos RAT execution and analysis can be watched in-depth in a video recorded in the ANY.RUN malware hunting service. Moreover, you can also research other malicious families there such as AZORult and Adwind.

process graph of the Remcos execution Figure 1: Displays the lifecycle of Remcos as presented by a visual graph generated by ANY.RUN

text report 0f the Remcos trojan analysis Figure 2: A customizable text report generated by ANY.RUN is a feature specifically developed to simplify the sharing of analysis results.

Remcos trojan execution process

Remcos trojan can be delivered in different forms. Based on RAT's analysis, it can be spread as an executable file with the name that should convince users to open it, or it pretends to be a Microsoft Word file that exploits vulnerabilities to download and execute the main payload, obfuscate the server component.

In our analysis, after Remcos made its way to infect the device and begin the execution process, it started VBS script execution. Script ran command line and proceeded to drop an executable file from it. remcos execution process tree Figure 3: Execution processes of Remcos as displayed by the ANY.RUN malware analysis service

This file was the main payload, and it carried out the main malicious activities – stealing information, changing the autorun value in the registry, and connecting to the C2 server.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

How to detect Remcos using ANY.RUN?

Cybersecurity specialists can easily detect Remcos – the trojan writes its name into a registry. Look at registry events: click on the process and then on the More Info button. If the Registry changes tab has a key like "HKEY_CURRENT_USER\Software\Remcos-{digits_letters}", you can be sure it’s Remcos.

remcos log file Figure 4: Remcos registry changes analysis

Gathering threat intelligence on Remcos malware

To collect up-to-date intelligence on Remcos, use Threat Intelligence Lookup.

This service gives you access to a vast database filled with insights from millions of malware analysis sessions conducted in the ANY.RUN sandbox.

With over 40 customizable search parameters, including IPs, domains, file names, and process artifacts, you can efficiently gather relevant data on threats like Remcos.

Remcos ANY.RUN Search results for Remcos in Threat Intelligence Lookup

For example, you can search directly for the threat name or use related indicators like hash values or network connections. Submitting a query such as threatName:"remcos" AND domainName:"" will generate a list of files, events, domain names, and other data extracted from Remcos samples along with sandbox sessions that you can explore in detail to gain comprehensive insights into this malware’s behavior.

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Distribution of Remcos

Although being distributed using multiple methods, being provided in a bundle with mass mailer software, the analysis proves that Remcos RAT usually gets into victims’ machines through malicious attachments in spam email campaigns. The attackers normally use phishing techniques to try and trick users into downloading file attachments, commonly – contaminated Microsoft Office files. Once downloaded, the files would prompt the users to activate the macros required for the execution of Ramcos to start.

Attackers who utilize this trojan are known to target specific organizations and sometimes go a long way to craft custom phishing emails designed to fool their victims. Corporations that are known to become targets of Remcos attacks include news agencies and businesses energy industry-related businesses.

If the victim does enable the macros, they reconstruct a small executable file which is then dropped to a pre-specified location and launched from there. This file then proceeds to download the main payload, which is Remcos itself, from a control server and then begin the execution process. Even though the location can vary from sample to sample, it usually includes one of the following locations, typical for malware creators: %APPDATA% and %TEMP%.

Conclusion

Remcos RAT is a dangerous trojan available to attackers for a relatively low price. Despite its accessibility, it comes equipped with enough robust features to allow attackers to set up their own effective botnets. What's more, it is modernized with updates released nearly every month by the owner company. Accessibility and powerful feature set helped to make Ramcos into a powerful and dangerous trojan.

Thankfully, malware hunting services such as ANY.RUN gives professionals an equally robust feature set to research threats like Ramcos and respond with effective countermeasures.

Create your free ANY.RUN account to analyze malware and phishing without limits!

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More