yara/rules/Windows_Trojan_Remcos.yar (48 lines of code) (raw):
rule Windows_Trojan_Remcos_b296e965 {
meta:
author = "Elastic Security"
id = "b296e965-a99e-4446-b969-ba233a2a8af4"
fingerprint = "a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d"
creation_date = "2021-06-10"
last_modified = "2021-08-23"
threat_name = "Windows.Trojan.Remcos"
reference = "https://www.elastic.co/security-labs/exploring-the-ref2731-intrusion-set"
reference_sample = "0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$a1 = "Remcos restarted by watchdog!" ascii fullword
$a2 = "Mutex_RemWatchdog" ascii fullword
$a3 = "%02i:%02i:%02i:%03i"
$a4 = "* Remcos v" ascii fullword
condition:
2 of them
}
rule Windows_Trojan_Remcos_7591e9f1 {
meta:
author = "Elastic Security"
id = "7591e9f1-452d-4731-9bec-545fb0272c80"
fingerprint = "9436c314f89a09900a9b3c2fd9bab4a0423912427cf47b71edce5eba31132449"
creation_date = "2023-06-23"
last_modified = "2023-07-10"
threat_name = "Windows.Trojan.Remcos"
reference = "https://www.elastic.co/security-labs/exploring-the-ref2731-intrusion-set"
reference_sample = "4e6e5ecd1cf9c88d536c894d74320c77967fe08c75066098082bf237283842fa"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$a1 = "ServRem" ascii fullword
$a2 = "Screenshots" ascii fullword
$a3 = "MicRecords" ascii fullword
$a4 = "remcos.exe" wide nocase fullword
$a5 = "Remcos" wide fullword
$a6 = "logs.dat" wide fullword
condition:
3 of them
}