Summary: 2025/04/19 12:36
First reported date: 2021/05/07
Inquiry period : 2025/03/20 12:36 ~ 2025/04/19 12:36 (1 months), 1 search results
전 기간대비 신규 트렌드를 보이고 있습니다.
악성코드 유형 RemcosRAT NetWireRC Remcos 도 새롭게 확인됩니다.
기타 Low abusech httpstcouvC httpstcoP 신규 키워드도 확인됩니다.
Remcos is a RAT type malware that attackers use to perform actions on infected machines remotely. This malware is extremely actively caped up to date with updates coming out almost every single month.
참고로 동일한 그룹의 악성코드 타입은 Remcos njRAT QuasarRAT 등 110개 종이 확인됩니다.
Trend graph by period
Special keyword group
Top 5
Attacker & Actors
The status of the attacker or attack group being issued.
No data.

Technique
This is an attack technique that is becoming an issue.
No data.

Country & Company
This is a country or company that is an issue.
No data.
Malware Family
Top 5
A malware family is a group of applications with similar attack techniques.
In this trend, it is classified into Ransomware, Stealer, RAT or Backdoor, Loader, Botnet, Cryptocurrency Miner.
Threat info
Last 5SNS
(Total : 1)No | Title | Date |
---|---|---|
1 | Szabolcs Schmidt @smica83 Low detected #RemcosRAT @abuse_ch https://t.co/uvC4VTJ7mm https://t.co/P6021ENBgA | 2025.04.15 |
News
(Total : 0)No data.
Additional information
No | Title | Date |
---|---|---|
1 | Tesla to Delay Production of Cheaper EVs, Reuters Reports - Bloomberg Technology | 2025.04.19 |
2 | When Vulnerability Information Flows are Vulnerable Themselves - Malware.News | 2025.04.19 |
3 | CISA warns threat hunting staff of end to Google, Censys contracts as agency cuts set in - Malware.News | 2025.04.19 |
4 | Radiology practice reportedly working with FBI after ‘data security incident’ - Malware.News | 2025.04.19 |
5 | Text scams grow to steal hundreds of millions of dollars - Malware.News | 2025.04.19 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Cybercrime, RemcosRat si nasconde in una bozza di contratto - Difesa e Sicurezza | 2023.02.09 |
2 | Cybercrime, RemcosRAT via rimessa bancaria torna anche in Italia - Difesa e Sicurezza | 2022.06.14 |
Level | Description |
---|---|
danger | File has been identified by 66 AntiVirus engines on VirusTotal as malicious |
danger | The process wscript.exe wrote an executable file to disk which it then attempted to execute |
danger | Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually) |
danger | Executed a process and injected code into it |
warning | Disables Windows Security features |
watch | Communicates with host for which no DNS query was performed |
watch | Installs itself for autorun at Windows startup |
watch | One or more non-whitelisted processes were created |
watch | Potential code injection by writing to the memory of another process |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
watch | Used NtSetContextThread to modify a thread in a remote process indicative of process injection |
notice | A process attempted to delay the analysis task. |
notice | A process created a hidden window |
notice | Checks whether any human activity is being performed by constantly checking whether the foreground window changed |
notice | Creates a suspicious process |
notice | Creates executable files on the filesystem |
notice | Drops a binary and executes it |
notice | Drops an executable to the user AppData folder |
notice | One or more potentially interesting buffers were extracted |
notice | Terminates another process |
notice | Uses Windows utilities for basic Windows functionality |
notice | Yara rule detected in process memory |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
info | Command line console output was observed |
info | The executable contains unknown PE section names indicative of a packer (could be a false positive) |
No | URL | CC | ASN Co | Reporter | Date |
---|---|---|---|---|---|
1 | https://cml.lk/doc/r.txt DBatLoader ModiLoader opendir rat RemcosRAT | SG ![]() | DIGITALOCEAN-ASN | abuse_ch | 2025.04.17 |
2 | https://drive.google.com/uc?export=download&id=1drYJjwMm-iXdwPf_dl6qZkSgLKRNxZhC encrypted GuLoader rat RemcosRAT | US ![]() | abuse_ch | 2025.04.17 | |
3 | http://84.252.123.137/music/output.txt ascii Encoded rat RemcosRAT | DE ![]() | Aixit GmbH | abuse_ch | 2025.04.17 |
4 | http://www.nawatbsc.com/output/output.txt ascii Encoded rat RemcosRAT | CH ![]() | Simple Carrier LLC | abuse_ch | 2025.04.17 |
5 | https://downloadthecorrectversion.space/vickk/r.txt ascii rat RemcosRAT | US ![]() | MULTIBAND-NEWHOPE | abuse_ch | 2025.04.16 |
View only the last 5 |