Overview

REMCOS RAT is a remote access trojan that has been widely used in cybercriminal and espionage campaigns. It is known for its ability to hijack computers, collect keystrokes, audio, video, screenshots, and system data, as well as deliver additional malware payloads. The malware is often delivered through phishing emails with malicious attachments or links that lead to the installation of the RAT. REMCOS has also been observed being delivered through the DBatLoader malware loader and GuLoader. The malware is sold commercially by Breaking Security but has been used for malicious purposes since the mid-2010s.

It has been observed in various parts of the world and is known for its stealthy behaviour, including the use of public cloud infrastructure and anti-analysis techniques. The most recent events involving REMCOS RAT include a phishing campaign targeting Eastern European institutions and businesses with DbatLoader and REMCOS RAT malware in March 2023, and a new campaign targeting US accounting and tax return preparation firms ahead of Tax Day in April 2023. In recent months, there have also been several reports of REMCOS being used in campaigns targeting Ukrainian government entities and organisations in Eastern Europe.

REMCOS works by initially using brute force attacks on insecure servers then gaining access , taking control of the PowerShell utility, downloading, and installing an obfuscated Visual Basic script file which is then executed. After the malware has executed, a wide range of tools can be used such as screen capture, key logging and many more.

Impact

If the REMCOS is successfully executed, it will lead to full control and surveillance of the target system which will allow threat actors to exfiltrate sensitive data over a potentially long period of time, if undetected. Use of this sensitive data, depending on the target, could lead to victims being blackmailed, loss of employment if company data is involved and stolen organisational data which could be used to launch a large-scale sophisticated attack. It is likely that this would lead to irreparable damage to organisations or individuals’ livelihoods.

Download this report

Further Malware Reports from Quorum Cyber

Headquarters

Verdant
2 Redheughs Rigg
Edinburgh
United Kingdom
EH12 9DQ

Colorado, USA Office

950 S Cherry St Ste 505
Denver, Colorado
USA
80246

Dubai, UAE Office

Meydan Grandstand
6th floor
Meydan Road
Nad AI Sheba
Dubai, U.A.E

Colorado, USA Office

950 S Cherry St Ste 505
Denver, Colorado
USA
80246

Ontario, Canada Office

1375 North Service Rd E
Suite 102
Oakville
Ontario L6H 1A7

Arizona, USA Office

1300 S Litchfield Rd
110-L, Goodyear
USA
Arizona 85338

Contact Us
Address

Verdant
2 Redheughs Rigg
Edinburgh
United Kingdom
EH12 9DQ

950 S Cherry St Ste 505
Denver, Colorado
USA
80246

1375 North Service Rd E
Suite 102
Oakville
Ontario L6H 1A7

HEADQUARTERS
Verdant
2 Redheughs Rigg
Edinburgh
United Kingdom
EH12 9DQ



COLORADO, USA OFFICE
950 S Cherry St Ste 505
Denver, Colorado
USA
80246


ONTARIO, CANADA OFFICE
1375 North Service Rd E
Suite 102
Oakville
Ontario L6H 1A7


Legal

Privacy Preference Center

Skip to content