Summary: 2025/04/29 01:59
First reported date: 2021/05/07
Inquiry period : 2025/04/28 01:59 ~ 2025/04/29 01:59 (1 days), 1 search results
지난 7일 기간대비 신규 트렌드를 보이고 있습니다.
악성코드 유형 RemcosRAT NetWireRC Remcos 도 새롭게 확인됩니다.
기타 Low VBS abusech httpstcoPoOiqUwJjt VBScript 신규 키워드도 확인됩니다.
Remcos is a RAT type malware that attackers use to perform actions on infected machines remotely. This malware is extremely actively caped up to date with updates coming out almost every single month.
참고로 동일한 그룹의 악성코드 타입은 Remcos njRAT QuasarRAT 등 112개 종이 확인됩니다.
Trend graph by period
Special keyword group
Top 5
Attacker & Actors
The status of the attacker or attack group being issued.
No data.

Technique
This is an attack technique that is becoming an issue.
No data.

Country & Company
This is a country or company that is an issue.
No data.
Malware Family
Top 5
A malware family is a group of applications with similar attack techniques.
In this trend, it is classified into Ransomware, Stealer, RAT or Backdoor, Loader, Botnet, Cryptocurrency Miner.
Threat info
Last 5SNS
(Total : 1)RemcosRAT VBS NetWireRC Remcos VBScript
No | Title | Date |
---|---|---|
1 | Szabolcs Schmidt @smica83 Low detected #RemcosRAT VBS @abuse_ch https://t.co/PoOiqUwJjt https://t.co/pfcM1xjyZt | 2025.04.28 |
News
(Total : 0)No data.
Additional information
No | Title | Date |
---|---|---|
1 | Employee monitoring app exposes users, leaks 21+ million screenshots - Malware.News | 2025.04.28 |
2 | Introducing XSIAM 3.0 - Malware.News | 2025.04.28 |
3 | Deploy Bravely with Prisma AIRS - Malware.News | 2025.04.28 |
4 | 2025 Cyber Resilience Research Discovers Speed of AI Advancing Emerging Attack Types - Malware.News | 2025.04.28 |
5 | Intel CEO Targets Change in Corporate Culture to Shape Up - Bloomberg Technology | 2025.04.28 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Cybercrime, RemcosRat si nasconde in una bozza di contratto - Difesa e Sicurezza | 2023.02.09 |
2 | Cybercrime, RemcosRAT via rimessa bancaria torna anche in Italia - Difesa e Sicurezza | 2022.06.14 |
Level | Description |
---|---|
danger | File has been identified by 66 AntiVirus engines on VirusTotal as malicious |
danger | The process wscript.exe wrote an executable file to disk which it then attempted to execute |
danger | Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually) |
danger | Executed a process and injected code into it |
warning | Disables Windows Security features |
watch | Communicates with host for which no DNS query was performed |
watch | Installs itself for autorun at Windows startup |
watch | One or more non-whitelisted processes were created |
watch | Potential code injection by writing to the memory of another process |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
watch | Used NtSetContextThread to modify a thread in a remote process indicative of process injection |
notice | A process attempted to delay the analysis task. |
notice | A process created a hidden window |
notice | Checks whether any human activity is being performed by constantly checking whether the foreground window changed |
notice | Creates a suspicious process |
notice | Creates executable files on the filesystem |
notice | Drops a binary and executes it |
notice | Drops an executable to the user AppData folder |
notice | One or more potentially interesting buffers were extracted |
notice | Terminates another process |
notice | Uses Windows utilities for basic Windows functionality |
notice | Yara rule detected in process memory |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
info | Command line console output was observed |
info | The executable contains unknown PE section names indicative of a packer (could be a false positive) |
No | URL | CC | ASN Co | Reporter | Date |
---|---|---|---|---|---|
1 | http://188.127.231.170/460/cent/camewithbesttechnologygivenmebestthingsentierimte______camewithbestt... RemcosRAT | RU ![]() | LLC Smart Ape | DaveLikesMalwre | 2025.04.28 |
2 | http://178.173.244.118/wuBQR165.bin GuLoader rat RemcosRAT | AU ![]() | Wholesale Services Provider | abuse_ch | 2025.04.27 |
3 | http://185.215.113.19//inc/file.exe RemcosRAT | anonymous | 2025.04.26 | ||
4 | http://185.215.113.19//inc/DEF.exe RemcosRAT | anonymous | 2025.04.26 | ||
5 | http://185.215.113.117//inc/DEF.exe RemcosRAT | abus3reports | 2025.04.26 | ||
View only the last 5 |