Remcos RAT Being Distributed to Korean Users
AhnLab SEcurity intelligence Center (ASEC) has confirmed the RAT distribution of the Remcos RAT targeting users in South Korea. While the original distribution pages remain unknown, the malware appears to masquerade as VeraCrypt installers or software associated with illegal gambling websites.
1. Malware Distribution
One of the initial malware samples displays an interface labeled “Blocklist User DB Lookup *****Club”. In this context, “Blocklist User” refers to gambling‑site account status category. The program pretends to query a remote database (acting as a C2 server) to look up these restricted accounts.

Figure 1. GUI screen of the distributed Remcos RAT
Distribution has occurred through web browsers and Telegram, using file names such as “*****usercon.exe” or “blackusernon.exe.”
| Distribution Name |
|---|
| %USERPROFILE%\downloads\programs\*****usercon.exe |
| %USERPROFILE%\downloads\telegram desktop\*****usercon.exe |
| %USERPROFILE%\downloads\programs\blackusernon.exe |
Table 1. File names used when distributing Malware
The keywords displayed in the GUI—such as “*****Club”—and the terms embedded in the filenames are associated with so‑called “Blocklist user lookup site” used within illegal online gambling ecosystems. In this context, a “Blocklist user lookup site” refers to platforms used by operators or users of private sports‑betting or casino services to look up accounts that have been flagged or blocked. Although the exact distribution page remains unknown, the GUI and filenames strongly suggest that the malware is being distributed by impersonating tools that claim to offer blocklist‑lookup functionality for illegal gambling operators or users.
2. Dropper Malware (DB lookup program/VeraCrypt installer impersonation)
Although login functionality in the fake lookup program is non-operational, the GUI and internal routines make it appear to support blocklist‑querying features. However, embedded within the resource section are two malicious VBS scripts. During execution, these scripts are written to the %TEMP% directory under randomized filenames and then executed.

Figure 2. VBS malware included in the resource
Another strain disguises itself as a VeraCrypt utility installer, distributed as installer.exe. This version is packaged using a 7z SFX archive and also contains a malicious VBS script.

Figure 3. Malware disguised as the VeraCrypt utility installer
3. VBS/PowerShell Downloader and Injector
The threat actor used multiple stages of obfuscated VBS and PowerShell scripts before deploying the Remcos RAT. These scripts include dummy comments, junk data, and misleading extensions. In one sample, the file masquerades as a JPG image while embedding a Base64-encoded PE payload between separators.

Figure 4. Malware inside the obfuscated routine and dummy data
| Stage | Type | Name |
|---|---|---|
| 1 | Installer | |
| 2 | VBS downloader | %TEMP%[Random].vbs |
| 3 | VBS dropper | XX12.JPG |
| 4 | VBS downloader | Config.vbs |
| 5 | VBS downloader | L1k9.JPG |
| 6 | PowerShell downloader | NMA1.JPG |
| 7 | Injector | XIN_PHOTO.JPG |
| 8 | Remcos RAT | Aw21.JPG |
Table 2. Malware Flow
After progressing through five scripted stages, the chain delivers a .NET‑based injector. The injector sends logs to the attacker via Discord Webhooks. It then downloads Remcos RAT payload from a URL passed as an argument, decrypts it, and injects it into the AddInProcess32.exe process. Notably, this injector contains Korean‑language messages not commonly seen in other Remcos workflows.

Figure 5. Routine of the injector malware
4. Remcos RAT
Remcos is a commercially sold remote administration tool that has long been abused by threat actors. Beyond conventional remote‑control capabilities—such as command execution, file management, and process control—it supports a range of data‑theft functions, including keylogging, screenshot capture, webcam and microphone control, and credential extraction from web browsers.
The malware stores configuration data within an encrypted resource named “SETTINGS”, which reveals attacker‑defined settings upon decryption.

Figure 6. Settings of Remcos RAT
| Case | C&C server | Name | Mutex, registry key |
|---|---|---|---|
| A | 142.248.231[.]252:48192 (TLS) | Remote Host | Stock Price Ticker-YJ09LV |
| B | 142.248.231[.]251:2404 (TLS) | RemoteHost | Rmc-BTQ3H5 |
| C | 205.198.88[.]94:2255 (TLS) | ?? ??? | ?? ?? ???-3SDRQJ |
Table 3. Some configurations of the used Remcos RAT
Some variants of Remcos RAT disguise themselves as a “stock price ticker” and even use Korean strings in their mutex names and registry keys. In addition, because certain variants have offline keylogging enabled, the captured keystroke strings are stored in the %ALLUSERSPROFILE%\remcos\ directory.

Figure 7. Korean strings stored in the registry

Figure 8. Logged keystroke data
5. Conclusion
Recent cases indicate that attackers have been actively distributing Remcos RAT to users in South Korea. Based on the file names used in the campaign, it appears that the primary targets may be operators or users of illegal online gambling platforms. However, the presence of malware disguised as VeraCrypt utility suggests that general users may also be included in the attackers’ distribution scope.
Because Remcos is a RAT capable not only of remote control but also of extensive data‑theft activities—including keylogging, screenshot capture, webcam and microphone access, and extraction of web browser credentials—users infected with Remcos RAT face a significant risk of having sensitive information compromised.