Threat Hunting Content: Remcos RAT COVID19 Campaigns

Remcos RAT was first spotted in 2016. Now it hat purports to be a legitimate remote access tool but it was used in multiple global hacking campaigns. On various sites and forums, cybercriminals advertise, sell, and offer the cracked version of this malware. Since the end of February, security researchers have discovered several campaigns that distribute Remcos Trojan and exploit the COVID-19 theme in phishing emails. 

A few weeks ago, another campaign aimed at a small business in the United States became known: attackers spoofed the U.S. Government Small Business Administration email to ensure their victims open the malicious attachment and start multi-stage execution, starting with the GuLoader downloader to deliver the Trojan. Remcos can be used to spy on its victims, collect credentials, exfiltrate files, and execute commands. 

Threat hunting rule by Osman Demir enables your security solution to detect fresh instances of this Remote Access Trojan:

Threat Detection is supported for the following platforms:

SIEM: Azure Sentinel, ArcSight, QRadar, Splunk, Graylog, Sumo Logic, ELK Stack, RSA NetWitness, Logpoint, Humio, RSA NetWitness, Sumo Logic

EDR: Elastic Endpoint



Tactics: Execution

Techniques: User Execution (T1204)


YARA rules by Osman Demir to uncover the RAT:

More content by Emir Erdogan related to the Trojan and recent campaigns:

Remcos RAT Backdoor Detection –

Remcos RAT downloaded via Internet Explorer –

GuLoader Downloads REMCOS and PARALLAX RAT –

Remcos Remote Access Tool (RAT) – YARA Rules –

Was this article helpful?

Like and share it with your peers.
Join SOC Prime's Detection as Code platform to improve visibility into threats most relevant to your business. To help you get started and drive immediate value, book a meeting now with SOC Prime experts.

Related Posts