RemcosRAT

RemcosRAT Description

RemcosRAT is a Remote Access Trojan that is designed to work on the Windows OS platform. RemcosRAT is deployed to PC users via spam email, malvertising, and fake updates for Windows 7, 8 and 10. The threat is named after the primary executable used to facilitate its operations—remcos.exe. AV vendors may detect files related to RemcosRAT under the following tags:

  • BKDR_SOCMER.SM
  • Backdoor:Win32/Rescoms.A!bit
  • Generic.Malware.SL!B.78084EDB
  • HEUR/QVM07.1.0000.Malware.Gen
  • Trj/GdSda.A
  • Trojan.DownLoader22.28028
  • W32/Bloop.A.gen!Eldorado
  • Win32:RemcosRAT-A [Trj]
  • trojandownloader.win32.qqhelper.ka

RemcosRAT is a standard Remote Access Trojan that supports most features you would expect from a RAT. The threat at hand can track what programs are running on the system, index data stored on local drives, make modifications to installed software and issue commands to the Windows kernel. Initial threat assessment revealed that RemcosRAT connects to a remote host via HTPP channel and waits for commands. Attackers could use RemcosRAT to lower your cyber defenses and install apps remotely. RemcosRAT might store its files in the Temp directory where Windows saves temporary Internet files used while you surf the Web. We have reports that RemcosRAT can connect to the 169.159.67.215 IP address and access data on the donemix.duckdns.org site. This portal is flagged by AV vendors and Web filters as unsafe already. Computer users that notice missing programs from their OS and unusual data transmissions might wish to scan their machine with a reliable anti-malware application.

Technical Information

File System Details

RemcosRAT creates the following file(s):
# File Name Size MD5 Detection Count
1 %ALLUSERSPROFILE%\task manager\7g1cq51137eqs.exe\7g1cq51137eqs.exe 933,888 aeca465c269f3bd7b5f67bc9da8489cb 83
2 321.exe 262,144 d435cebd8266fa44111ece457a1bfba1 45
3 %SYSTEMDRIVE%\users\user\appdata\roaming\microsoft\windows\dsvhelper\windslfj.exe\windslfj.exe 897,536 968650761a5d13c26197dbf26c56552a 5
4 C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Legit Program.exe 192,512 cd2c23deea7f1eb6b19a42fd3affb0ee 3
5 C:\Users\Roberto\AppData\Roaming\unseen.exe 250,687 d8cff8ec41992f25ef3127e32e379e3b 2
6 file.exe 264,704 8671446732d37b3ad4c120ca2b39cfca 0
7 e12cd6fe497b42212fa8c9c19bf51088 745,472 e12cd6fe497b42212fa8c9c19bf51088 0
8 %SYSTEMDRIVE%\users\user\appdata\roaming\chrome\chrome.exe\chrome.exe 36,864 a087bc63ae1d76d5c1e0a965a1f11e65 0
9 50a62912a3a282b1b11f78f23d0e5906 632,832 50a62912a3a282b1b11f78f23d0e5906 0
More files

Registry Details

RemcosRAT creates the following registry entry or registry entries:
Regexp file mask
%APPDATA%\aitagent\aitagent.exe
%APPDATA%\Analysernes1.exe
%APPDATA%\Audiohd.exe
%APPDATA%\Bagsmks8.exe
%APPDATA%\Behandlingens[RANDOM CHARACTERS].exe
%APPDATA%\Brnevrelser[RANDOM CHARACTERS].exe
%appdata%\calc.exe
%APPDATA%\chrome\chrome.exe
%APPDATA%\deseret.pif
%APPDATA%\explorer\explore.exe
%APPDATA%\Extortioner.exe
%APPDATA%\firewall.exe
%APPDATA%\foc\foc.exe
%APPDATA%\Holmdel8.exe
%APPDATA%\Install\laeu.exe
%APPDATA%\Irenas.exe
%APPDATA%\Javaw\Javaw.exe
%APPDATA%\Machree[RANDOM CHARACTERS].exe
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\filename.exe
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\firewall.vbe
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\Holmdel8.vbe
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\Legit Program.exe
%APPDATA%\Mozila\Mozila.exe
%APPDATA%\newremcos.exe
%APPDATA%\remcos.exe
%APPDATA%\SearchUI.exe
%APPDATA%\Smartse\smartse.exe
%AppData%\spoolsv.exe
%APPDATA%\System\logs.dat
%APPDATA%\Tornlst.exe
%APPDATA%\WindowsDefender\WindowsDefender.exe
%PROGRAMFILES%\AppData\drivers.exe
%TEMP%\Name of the melted file.exe
%WINDIR%\System32\remcomsvc.exe
%WINDIR%\SysWOW64\remcomsvc.exe
Directory
%ALLUSERSPROFILE%\task manager
%APPDATA%\appdata
%APPDATA%\Badlion
%APPDATA%\Extress
%APPDATA%\GoogleChrome
%APPDATA%\googlecrome
%APPDATA%\hyerr
%APPDATA%\JagexLIVE
%APPDATA%\loader
%APPDATA%\pdf
%APPDATA%\Remc
%APPDATA%\remcoco
%AppData%\remcos
%APPDATA%\Shockwave
%APPDATA%\ujmcos
%APPDATA%\verify
%APPDATA%\windir
%PROGRAMFILES(x86)%\Microsft Word
%TEMP%\commonafoldersz
%TEMP%\remcos
%Userprofile%\remcos
%WINDIR%\notepad++
%WINDIR%\remcos
%WINDIR%\System32\rel
%WINDIR%\System32\remcos
%WINDIR%\SysWOW64\Adobe Inc
%WINDIR%\SysWOW64\remcos
%WINDIR%\SysWOW64\skype
Registry key
SOFTWARE\Microsoft\Windows\CurrentVersion\Run\remcos
SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\remcos

Site Disclaimer

Enigmasoftware.com is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.