yara/rules/Windows_Trojan_Remcos.yar (48 lines of code) (raw):

rule Windows_Trojan_Remcos_b296e965 { meta: author = "Elastic Security" id = "b296e965-a99e-4446-b969-ba233a2a8af4" fingerprint = "a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d" creation_date = "2021-06-10" last_modified = "2021-08-23" threat_name = "Windows.Trojan.Remcos" reference = "https://www.elastic.co/security-labs/exploring-the-ref2731-intrusion-set" reference_sample = "0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "windows" strings: $a1 = "Remcos restarted by watchdog!" ascii fullword $a2 = "Mutex_RemWatchdog" ascii fullword $a3 = "%02i:%02i:%02i:%03i" $a4 = "* Remcos v" ascii fullword condition: 2 of them } rule Windows_Trojan_Remcos_7591e9f1 { meta: author = "Elastic Security" id = "7591e9f1-452d-4731-9bec-545fb0272c80" fingerprint = "9436c314f89a09900a9b3c2fd9bab4a0423912427cf47b71edce5eba31132449" creation_date = "2023-06-23" last_modified = "2023-07-10" threat_name = "Windows.Trojan.Remcos" reference = "https://www.elastic.co/security-labs/exploring-the-ref2731-intrusion-set" reference_sample = "4e6e5ecd1cf9c88d536c894d74320c77967fe08c75066098082bf237283842fa" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "windows" strings: $a1 = "ServRem" ascii fullword $a2 = "Screenshots" ascii fullword $a3 = "MicRecords" ascii fullword $a4 = "remcos.exe" wide nocase fullword $a5 = "Remcos" wide fullword $a6 = "logs.dat" wide fullword condition: 3 of them }