Short bio

Trojan.Remcos is Malwarebytes’ detection name for a Remote Administration Tool (RAT) targeting Windows systems.

Type and source of infection

Trojan.Remcos typically infects a system by embedding a specially-crafted settings file into an Office document, this allows an attacker can trick a user to run malicious code without any further warning or notification. The code is XML code which allows for any binary with parameters to be executed. This code is used to download and execute the REMCOS RAT.


Trojan.Remcos gives the threat actor full control over the infected system and allows them to run keyloggers and surveillance (audio + screenshots) mode. This means:

  • Data/information about the system may have been stolen
  • User credentials may have been stolen
  • Digital coins may have been stolen
  • Affected system may be susceptible to further attacks and/or infection due to a backdoor that was opened


Malwarebytes protects users from Trojan.Remcos by using Application Behavior Protection.

Malwarebytes blocks Trojan.Remcos


Malwarebytes can detect and remove Trojan.Remcos without further user interaction.

  1. Please download Malwarebytes to your desktop.
  2. Double-click mb3-setup-consumer-{version}.exe and follow the prompts to install the program.
  3. Then click Finish.
  4. Once the program has fully updated, select Scan Now on the Dashboard. Or select the Threat Scan from the Scan menu.
  5. If another update of the definitions is available, it will be implemented before the rest of the scanning procedure.
  6. When the scan is complete, make sure that all Threats are selected, and click Remove Selected.
  7. Restart your computer when prompted to do so.









Select your language