MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0ffc737f786def0d033fdfaaf20cdbc52ffc367d50b607b8cc89e62735b480df. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 2


Intelligence 2 IOCs YARA File information Comments

SHA256 hash: 0ffc737f786def0d033fdfaaf20cdbc52ffc367d50b607b8cc89e62735b480df
SHA3-384 hash: ea10d5d2751233bb9874be395f1ef231d652f2827383d00138f42befeb9c04f21dee6dda739fc32fc3398103b9fd98c1
SHA1 hash: 08a00eea38fb9fcbd1fbf70c3284928ee3f5efb7
MD5 hash: 073fd739c27265f496ce4843e0d8857f
humanhash: arizona-oven-september-harry
File name:PU1-00037 2020-05-23.IMG
Download: download sample
Signature RemcosRAT
File size:1'245'184 bytes
First seen:2020-05-25 11:54:11 UTC
Last seen:Never
File type: img
MIME type:application/x-iso9660-image
ssdeep 6144:Ox+eiVxhljhggrslQdDr5gHcjDlBYrWsiX/o0:Ox+XhjvrrdmCpsW/
TLSH D045E04033A86B1FD57F6BF505A124021BF1B56E2612E34DBDCE61DE0BA6F804A42F97
Reporter abuse_ch
Tags:img nVpn RAT RemcosRAT


Avatar
abuse_ch
Malspam distributing RemcosRAT:

HELO: sogefigroup.com
Sending IP: 192.236.161.156
From: IR<ir@sogefigroup.com>
Subject: CONFIRM YOUR COMPANY PRICE
Attachment: PU1-00037 2020-05-23.IMG (contains "PU1-00037 (2020-05-23).exe")

RemcosRAT C2:
79.134.225.118:6667

Hosted on nVpn:

% Information related to '79.134.225.64 - 79.134.225.127'

% Abuse contact for '79.134.225.64 - 79.134.225.127' is 'abuse@your-vpn.network'

inetnum: 79.134.225.64 - 79.134.225.127
netname: YOUR_VPN_NETWORK
country: DE
remarks: ****************************************************
remarks: This subnet belongs to a VPN service provider.
remarks: We protect the right to privacy, which means
remarks: we don't log the activities of our users.
remarks: ****************************************************
admin-c: EH4074-RIPE
tech-c: YVN10-RIPE
status: ASSIGNED PA
abuse-c: YVN10-RIPE
org: ORG-YVN1-RIPE
mnt-by: AF15-MNT
created: 2019-07-19T18:26:38Z
last-modified: 2019-07-19T18:51:28Z
source: RIPE

Intelligence


File Origin
# of uploads :
1
# of downloads :
62
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-05-25 12:03:45 UTC
File Type:
Binary (Archive)
Extracted files:
9
AV detection:
14 of 30 (46.67%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

img 0ffc737f786def0d033fdfaaf20cdbc52ffc367d50b607b8cc89e62735b480df

(this sample)

  
Dropping
RemcosRAT
  
Delivery method
Distributed via e-mail attachment

Comments