Remcos RAT Uses Fileless PowerShell Attacks to Evade Detection
A new Remcos RAT campaign is using fileless PowerShell techniques to bypass security defenses and gain persistent remote access to infected systems
Introduction
A sophisticated malware campaign involving Remcos RAT (Remote Control and Surveillance Trojan) has recently been identified, showcasing the increasing use of fileless attack techniques by cybercriminals. This approach enables attackers to evade traditional antivirus solutions while maintaining persistent access to compromised systems.
Originally developed as a legitimate remote administration tool, Remcos has since become widely abused by cybercriminals and Advanced Persistent Threat (APT) groups for espionage, credential theft, and system takeover.
What Is Remcos RAT?
Remcos (Remote Control and Surveillance) is a Remote Access Trojan (RAT) created by Breaking Security. While initially promoted for lawful remote system management, it has been extensively misused for malicious activities such as:
-
Remote command execution
-
Credential and data theft
-
User activity monitoring
-
Persistent system access
Infection Mechanism
In the latest observed campaign, attackers rely on a fileless execution chain that avoids writing malicious files to disk.
Infection Chain
-
Phishing emails deliver ZIP archives
-
The ZIP contains a deceptive
.lnkshortcut file -
Opening the shortcut launches
mshta.exe -
mshta.exeexecutes a remote, obfuscated VBScript -
The script downloads a PowerShell-based shellcode loader
-
The loader executes entirely in memory
-
Remcos RAT is injected into
svchost.exeusing Process Hollowing
To ensure persistence, the malware modifies the following registry key:
Post-Infection Behavior
Once deployed, Remcos RAT performs several malicious activities:
-
Injects itself into legitimate system processes
-
Collects operating system and software information
-
Monitors file contents and user activity
-
Establishes encrypted TLS communication with its command-and-control server
-
Maintains persistence through registry-based autostart entries
Why This Attack Is Dangerous
-
Fileless execution leaves minimal forensic evidence
-
Abuse of trusted Windows utilities helps evade detection
-
Traditional antivirus solutions often fail to detect memory-based attacks
-
Enables long-term surveillance and full system compromise
Indicators of Compromise (IoCs)
File Hash
Domains
IP Addresses
Security Recommendations
-
Do not open unsolicited email attachments
-
Block
.lnk,.hta,.js,.vbs, and executable attachments -
Restrict PowerShell and WScript usage
-
Enable PowerShell logging and centralized monitoring
-
Keep operating systems and applications updated
-
Disable RDP if not required
-
Maintain regular offline backups
-
Implement application whitelisting and network segmentation
Conclusion
The latest Remcos RAT campaign highlights how attackers are increasingly relying on fileless PowerShell techniques to bypass traditional defenses. Organizations must adopt a layered security approach, combining endpoint protection, user awareness, and advanced logging to effectively defend against such evolving threats.