← Back to SOC feed Coverage →

ThreatFox: Remcos IOCs

ioc-hunt HIGH ThreatFox
CommonSecurityLogDeviceNetworkEventsDnsEvents
iocthreatfoxwin-remcos
This detection content is auto-generated from open-source rule repositories and enriched with AI analysis. Always validate rules in a test environment before deploying to production Sentinel workspaces.
View original rule at ThreatFox →
Retrieved: 2026-03-19T03:46:59Z · Confidence: high

Hunt Hypothesis

Hunt package for 9 IOCs associated with Remcos

IOC Summary

Malware Family: Remcos Total IOCs: 9 IOC Types: domain, ip:port

TypeValueThreat TypeFirst SeenConfidence
ip:port141[.]98[.]10[.]162:2404botnet_cc2026-03-19100%
ip:port107[.]189[.]23[.]49:2404botnet_cc2026-03-19100%
ip:port172[.]111[.]232[.]233:8201botnet_cc2026-03-19100%
domainwww.crysaltimedubai.combotnet_cc2026-03-18100%
domainwww.crysaltimedubaibackup1.combotnet_cc2026-03-18100%
domainwww.crysaltimedubaibackup2.combotnet_cc2026-03-18100%
ip:port45[.]74[.]48[.]103:3421botnet_cc2026-03-18100%
ip:port147[.]45[.]179[.]125:34610botnet_cc2026-03-18100%
ip:port45[.]59[.]163[.]56:4550botnet_cc2026-03-18100%

KQL: Ip Hunt

// Hunt for network connections to known malicious IPs
// Source: ThreatFox - Remcos
let malicious_ips = dynamic(["107.189.23.49", "45.59.163.56", "147.45.179.125", "172.111.232.233", "45.74.48.103", "141.98.10.162"]);
CommonSecurityLog
| where DestinationIP in (malicious_ips) or SourceIP in (malicious_ips)
| project TimeGenerated, SourceIP, DestinationIP, DestinationPort, DeviceAction, Activity
| order by TimeGenerated desc

KQL: Ip Hunt Device

// Hunt in Defender for Endpoint network events
let malicious_ips = dynamic(["107.189.23.49", "45.59.163.56", "147.45.179.125", "172.111.232.233", "45.74.48.103", "141.98.10.162"]);
DeviceNetworkEvents
| where RemoteIP in (malicious_ips)
| project Timestamp, DeviceName, RemoteIP, RemotePort, InitiatingProcessFileName, ActionType
| order by Timestamp desc

KQL: Domain Hunt

// Hunt for DNS queries to known malicious domains
// Source: ThreatFox - Remcos
let malicious_domains = dynamic(["www.crysaltimedubai.com", "www.crysaltimedubaibackup1.com", "www.crysaltimedubaibackup2.com"]);
DnsEvents
| where Name has_any (malicious_domains)
| project TimeGenerated, Computer, Name, IPAddresses, QueryType
| order by TimeGenerated desc

Required Data Sources

Sentinel TableNotes
CommonSecurityLogEnsure this data connector is enabled
DeviceNetworkEventsEnsure this data connector is enabled
DnsEventsEnsure this data connector is enabled

References

Original source: https://threatfox.abuse.ch/browse/malware/win.remcos/