Remcos RAT Malware: Secure Your PowerShell Against Fileless Attacks

Windows debtors have to be on high vivacious for the Remcos Secluded Access Trojan (RAT). This malware deploys an madly devious haul via phishing, via no downloads vital. One irresponsible click on a ominous ZIP affiliation, and the RAT springs into response, implementing HTML implementations via PowerShell. From there, it can squeeze screenshots, log keystrokes, and collar full control of your gadget.
Here’s how to preserve your PowerShell from Remcos RAT and any opposite other fileless blows.
Table of Active ingredients
- How Remcos RAT Hijacks PowerShell to Confiscate Over Your Gizmo
- Derail Remcos RAT from Implementing in PowerShell
- Immobilize MSHTA.exe to Derail Remcos RAT from Implementing
- Other Methodologies to Derail Secluded Exploits in PowerShell
How Remcos RAT Hijacks PowerShell to Confiscate Over Your Gizmo
Coverage firm Qualys unveiled the ease of the Remcos RAT burden. Victims receive a ZIP including a underhanded LNK document, a Windows faster means disguised as a real document. As of Can 2025, enemies are enlisting taxeses themed phishing emails, yet future versions can utilise anything that peculiarities you into clicking links.
As speedily as you open the LNK document, it mobilizes a Windows prayer amassed in touch with mshta.exe (Microsoft HTML Task Host). Next, a PowerShell script, such as “24.ps1” propels a shellcode loader to execute the Remcos RAT haul in real time. The burden implements not storefront any records on disk yet runs totally in memory.
Also, Microsoft Protector anti-virus is incapable to ordinance into response while enemies invent a remote TLS relationship. They are currently connecting to a command internet server amassed in touch with “ReadyRestaurants DOT com.” It’s flagged as “not safeguard” by Google Chrome. But this can match in the future.

Wonderfully reasonable: Windows PowerShell has come to be a favored tool for cybercriminals to execute devious blows that go undetected. Just last month, we saw it via Neptune RAT malware, which obligatory you to download a document first.
Derail Remcos RAT from Implementing in PowerShell
Initially, launch PowerShell in manager mode. After this, check whether it is in endless or banned mode.
Get-ExecutionPolicy
If your equipment is desperate to banned (which is ordinarily the default), slide on to the next off ordinance. Or else, first switch from endless earlier to banned. Click A as speedily as it asks you to attest this match.
Set-ExecutionPolicy Restricted

After implementing the above match, observe Qualys’ references and desperate PowerShell to Suppressed Language Mode. It blocks access to sensitive .NET approaches and COM objects, which Remcos RAT and parallel malware internationally manipulate.
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
For impeccable burden, warranty this setting applies to unanimously debtors, entailing non-admin debtors, also if you’re the only one enlisting the PC.
Set-ExecutionPolicy -Scope LocalMachine -ExecutionPolicy Restricted -Force

Qualys in addition prescribes putting on hold uncertain PowerShell command-queue crunches. This evades precursor unrealized manuscripts, prefer the HTA document in Remcos RAT blows, from implementing in the user’s PowerShell window.
Offered that Remcos RAT leverages PowerShell shellcode, there is a means to place these commands. Unless it is currently readily available on your PC, you may ultimata to by hand invent a lacking out on computer registry path for “PowerShell” and “ScriptBlockLogging.”
New-Item -Path "HKLM:SOFTWAREPoliciesMicrosoftWindowsPowerShell" -Force
New-Item -Path "HKLM:SOFTWAREPoliciesMicrosoftWindowsPowerShellScriptBlockLogging" -Force
Set-ItemProperty -Path "HKLM:SOFTWAREPoliciesMicrosoftWindowsPowerShellScriptBlockLogging" -Name "EnableScriptBlockLogging" -Value 1

Currently, permit the “ScriptBlockLogging” command and desperate its advantage to 1. This evades Remcos RAT and opposite other malware from sprinting shellcode loaders in PowerShell.
Set-ItemProperty -Path "HKLM:SOFTWAREPoliciesMicrosoftWindowsPowerShellScriptBlockLogging" -Name "EnableScriptBlockLogging" -Value 1

There is an additional related command to block uncertain command-queue crunches enlisting unrealized manuscripts.
New-Item -Path "HKLM:SOFTWAREPoliciesMicrosoftWindowsPowerShell" -Name "CommandLineFiltering" -Force
Set-ItemProperty -Path "HKLM:SOFTWAREPoliciesMicrosoftWindowsPowerShellCommandLineFiltering" -Name "EnableCommandLineFiltering" -Value 1

Sweet to recognize: the recent aggravation of AI-accumulated manuscripts in PowerShell has been a big component in malware authors delightfully being able to invent neoteric manuscripts to target contraptions.
Tab: some portals indicate debilitating PowerShell for non-Admin debtors. We will not attend that heavy-handed because enlisting a non-Admin Windows account has numerous top traits. For one, it shields you from cyber oversights that thieve login credentials, such as NT LAN Boss (NTLM).
Immobilize MSHTA.exe to Derail Remcos RAT from Implementing
Remcos RAT wears a prevalent gadget prayer on your Windows PC amassed in touch with “mshta.exe”. It is situated in “C:WindowsSystem32.”
Nowadays, debilitating mshta.exe is perfectly unanimously correct. It is regards seldom ever made utilise of, except in legacy implementations such as Net Explorer, or Workspace macro records. From Windows 11 version 24H2 onward, it has been perfectly deprecated.

Offered that mshta.exe runs HTML prayer (HTA) records, it is made utilise of to rushed VBScript or JavaScript exterior browsers via full gadget privileges.
In Windows 11 Pro, kind gpedit.msc
in the Sprinted command to attend District Group Manifesto Editor. Go down this path: Computer Arrangement -> Windows Positions -> Coverage Positions -> Software agenda Constraint Regulation.

If no review of tips exist, correct-click to invent a neoteric security manifesto by choosing Substantial Software agenda Constraint Regulation. As speedily as it is invented, under Second Suggestions, correct-click and pick Substantial Trail Notion.

Relabel this path to C:WindowsSystem32mshta.exe
. Unit security degree to Barred and click Use -> OK.
On Windows 11/10 Domicile machines, which lack Group Manifesto Editor, there is an additional means. Departure Windows Coverage, and attend App & Internet browser Fluctuation -> Manipulate Counterclaim -> Manipulate Counterclaim Positions -> Prospectus Positions. Here, click Add reign to modify.

The above will emphasize 2 solutions. Click Advance accurate document path. It will open your document wayfarer window. Navigate to the mshta.exe document location, and it will open in an additional pop-upward window.
Currently, you merely have to toggle off unanimously the mshta.exe review of tips which override the gadget precautions. If these have currently been toggled off, you don’t have to execute anything.

Relevant: resolve the woe if Windows Coverage is not functioning on your equipment.
Other Methodologies to Derail Secluded Exploits in PowerShell
Here are some opposite other points you can execute to hamper Remcos RAT and opposite other remote ventures from implementing in PowerShell.
- Invest in Windows endpoint reply software, such as Microsoft Protector, which is a dissimilar item than Windows Coverage.
- Update and place your contraptions traditionally. Relocating to version 24H2 in Windows 11 will cede fast patches to these latest oversights.
- Use e-mail purification and phishing reply on your internet internet browser emails made utilise of on Windows machines.