BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details
9
Global rank
3
Month rank
2 infographic chevron week
Week rank
2504
IOCs

Remcos is a RAT type malware that attackers use to perform actions on infected machines remotely. This malware is extremely actively caped up to date with updates coming out almost every single month.

Trojan
Type
ex-USSR territory
Origin
1 June, 2016
First seen
16 May, 2024
Last seen

How to analyze Remcos with ANY.RUN

Type
ex-USSR territory
Origin
1 June, 2016
First seen
16 May, 2024
Last seen

IOCs

IP addresses
89.117.145.5
20.121.128.235
62.102.148.166
103.150.8.12
107.173.4.16
107.175.229.139
45.83.31.16
141.95.84.40
94.156.65.86
192.161.184.21
185.189.112.19
213.5.130.58
62.102.148.185
172.96.14.57
64.188.18.137
66.63.162.155
89.249.73.162
185.158.113.101
92.223.106.203
192.210.201.57
Hashes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bbhmeetre1ms.freeddns.org
myumysmeetr.ddns.net
meetre1ms.freeddns.org
mysweeterbk.ddns.net
4.tcp.eu.ngrok.io
janbours92harbu01.duckdns.org
areaseguras.con-ip.com
comidafood.con-ip.com
sebastiancaicedodominiopers.con-ip.com
fenvijsdfidfisdiodwhfuew.con-ip.com
bellaudo.duckdns.org
whatgodcannotdodoestnotexist.duckdns.org
0.tcp.eu.ngrok.io
trutru.duckdns.org
marzo5.con-ip.com
marzo6.con-ip.com
abril16.con-ip.com
sdfsdjhswdbjhd.con-ip.com
01marzo.con-ip.com
leetboy.dynuddns.net
URLs
http://p4-preview.runhosting.com/breakingsec02.co.nf/Remcos/logaccess.php
http://p4-preview.runhosting.com/breakingsec02.co.nf/Remcos/OnlineCheck-v4.php
http://p4-preview.runhosting.com/breakingsec02.co.nf/Remcos/upd_free.txt
http://p4-preview.runhosting.com/breakingsec02.co.nf/Remcos/login.php
Last Seen at

Recent blog posts

post image
A Guide to ANY.RUN’s YARA Search 
watchers 51
comments 0
post image
Celebrate ANY.RUN’s 8th Birthday with Special...
watchers 101
comments 0
post image
How to Use Threat Intelligence Feeds
watchers 493
comments 0

What is Remcos trojan?

Remcos is a remote access trojan – a malware used to take remote control over infected PCs. This malicious software has been operational since 2016 when it first became available for sale in the underground hacker communities on the dark web.

Remcos RAT has been receiving substantial updates throughout its lifetime. In fact, this malware is being maintained extremely actively, with new releases coming out almost every month. In April 2019, the malware was available for purchase for as little as just over 60 dollars up to over 400 dollars depending on the selected package.

General description of Remcos trojan

This trojan is created and sold to clients by a “business” called Breaking Security. Although Breaking Security promises that the program is only available to those who intend to use it for legal purposes, in reality, Remcos RAT gives clients all necessary features to launch potentially destructive attacks. The malware can be purchased with different cryptocurrencies. The program can remotely control PCs with any Windows OS, including XP and newer. It can also capture screenshots, record keystrokes on infected machines, and send the collected information to host servers.

What’s more, it comes equipped with a crypto program that enables the malware to stay hidden from antivirus software. In fact, Breaking Security has released a video on its YouTube channel which demonstrates the analysis of how multiple antiviruses fail to detect the presence of the Remcos RAT. In addition, Breaking Security provides attackers with a keylogger that can be used to remotely record keystrokes of the victim, a mass mailer program that can be used to carry out distribution campaigns, and a DynDNS service with a client-server connection. With all additional services combined, purchasers gain all they need to create their own functioning botnets.

The company responsible for selling Remcos RAT to the criminals is registered in Germany. Germany is the only country out of all European Union members that do not allow looking up company details online. Therefore founders of Breaking Security are still not identified. The website itself does not provide any information about the company or the team behind Remcos. The domain name of the website itself is hosted on Cloudflare, and all information related to it is protected by the privacy policy of the hoster organization. Clearly, the people behind Breaking Security have taken a lot of effort to stay anonymous.

Get started today for free

Easily analyze emerging malware with ANY.RUN interactive online sandbox

Register for free

Remcos malware analysis

Remcos RAT execution and analysis can be watched in-depth in a video recorded in the ANY.RUN malware hunting service. Moreover, you can also research other malicious families there such as AZORult and Adwind.

process graph of the Remcos execution Figure 1: Displays the lifecycle of Remcos as presented by a visual graph generated by ANY.RUN

text report 0f the Remcos trojan analysis Figure 2: A customizable text report generated by ANY.RUN is a feature specifically developed to simplify the sharing of analysis results.

Remcos trojan execution process

Remcos trojan can be delivered in different forms. Based on RAT's analysis, it can be spread as an executable file with the name that should convince users to open it, or it pretends to be a Microsoft Word file that exploits vulnerabilities to download and execute the main payload, obfuscate the server component. In our analysis, after Remcos made its way to infect the device and begin the execution process, it started VBS script execution. Script ran command line and proceeded to drop an executable file from it. This file was the main payload, and it carried out the main malicious activities – stealing information, changing the autorun value in the registry, and connecting to the C2 server.

remcos execution process tree Figure 3: Execution processes of Remcos as displayed by the ANY.RUN malware analysis service

Distribution of Remcos

Although being distributed using multiple methods, being provided in a bundle with mass mailer software, the analysis proves that Remcos RAT usually gets into victims’ machines through malicious attachments in spam email campaigns. The attackers normally use phishing techniques to try and trick users into downloading file attachments, commonly – contaminated Microsoft Office files. Once downloaded, the files would prompt the users to activate the macros required for the execution of Ramcos to start.

Attackers who utilize this trojan are known to target specific organizations and sometimes go a long way to craft custom phishing emails designed to fool their victims. Corporations that are known to become targets of Remcos attacks include news agencies and businesses energy industry-related businesses.

If the victim does enable the macros, they reconstruct a small executable file which is then dropped to a pre-specified location and launched from there. This file then proceeds to download the main payload, which is Remcos itself, from a control server and then begin the execution process. Even though the location can vary from sample to sample, it usually includes one of the following locations, typical for malware creators: %APPDATA% and %TEMP%.

How to detect Remcos using ANY.RUN?

Cybersecurity specialists can easily detect Remcos – the trojan writes its name into a registry. Look at registry events: click on the process and then on the More Info button. If the Registry changes tab has a key like "HKEY_CURRENT_USER\Software\Remcos-{digits_letters}", you can be sure it’s Remcos.

remcos log file Figure 4: Remcos registry changes analysis

Conclusion

Remcos RAT is a dangerous trojan available to attackers for a relatively low price. Despite its accessibility, it comes equipped with enough robust features to allow attackers to set up their own effective botnets. What's more, it is modernized with updates released nearly every month by the owner company. Accessibility and powerful feature set helped to make Ramcos into a powerful and dangerous trojan.

Thankfully, malware hunting services such as ANY.RUN gives professionals an equally robust feature set to research threats like Ramcos and respond with effective countermeasures.

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More

Our website uses cookies. By visiting the pages of the site, you agree to our Privacy Policy