MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 09394473fc2c076486970d70011c480439b9e799be2966197e1d35bb9ee7b506. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 09394473fc2c076486970d70011c480439b9e799be2966197e1d35bb9ee7b506
SHA3-384 hash: ea378b94017d91e70aa86f8e06f72491b496d9f408fe957f5c4d3c378a879f7ae88b82d73536423aa0a8e3b618eee24c
SHA1 hash: b4d90930a846853abc55ce46ba6f7890f66a67e8
MD5 hash: 190d1afd030d80e7b449ad78e97d8cb7
humanhash: purple-eleven-black-coffee
File name:PO#21-4574,pdf.scr
Download: download sample
Signature RemcosRAT
File size:621'568 bytes
First seen:2020-06-23 13:25:04 UTC
Last seen:2020-06-23 13:50:47 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 37ec15e12a6a58142524cbf63ac13fd6 (6 x RemcosRAT, 2 x FormBook, 1 x NetWire)
ssdeep 12288:EARldIm597ql0ynjNHEJRXZdL38YN2Je7qWWWy/z:/XHql9njNHE5Z3PN2My/z
Threatray 938 similar samples on MalwareBazaar
TLSH 6BD4AF33F2C08876C57E29B9AD0F45E5951ABE757E18A48A3BCC1E4C4FBD2913C29193
Reporter abuse_ch
Tags:RAT RemcosRAT scr


Avatar
abuse_ch
Malspam distributing RemcosRAT:

HELO: cloudhost-433778.us-west-1.nxcli.net
Sending IP: 173.249.144.98
From: IZABELLE <info@gbp-international.com>
Subject: PO#21-23062020-Urgente
Attachment: PO21-4574.IMG (contains "PO#21-4574,pdf.scr")

RemcosRAT C2:
206.123.129.103:4565

Intelligence


File Origin
# of uploads :
2
# of downloads :
75
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2020-06-23 13:27:03 UTC
AV detection:
35 of 48 (72.92%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
persistence rat family:remcos
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of SetWindowsHookEx
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Adds Run entry to start application
Remcos
Malware Config
C2 Extraction:
206.123.129.103:4565
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

Executable exe 09394473fc2c076486970d70011c480439b9e799be2966197e1d35bb9ee7b506

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments