MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 210560d23e3c023c90bd24ed0d76c68732dc267277fc6adcc3c991cb611bb06a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 8


Intelligence 8 IOCs YARA 3 File information Comments

SHA256 hash: 210560d23e3c023c90bd24ed0d76c68732dc267277fc6adcc3c991cb611bb06a
SHA3-384 hash: 2b876dd7ca61369873703954305a93f86856b2dd49b98f4fe0461163508d523f52c2626cbb6f7ba0e39edcde1cedee40
SHA1 hash: 5ddb90b83f20f1d0218fec99f7af1f7a1bdfe0d9
MD5 hash: 7e1a3a4437986a8441db79ed61598a5b
humanhash: oxygen-thirteen-may-virginia
File name:POS Statements for Date - _22-07-2020.exe
Download: download sample
Signature RemcosRAT
File size:549'888 bytes
First seen:2020-07-22 10:08:05 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 45d579faec0eaf279c0841b2233727cf (6 x AgentTesla, 2 x MassLogger, 2 x NanoCore)
ssdeep 12288:HRmJ34UqACPQoKwICzPhVifZWFuGZkTP2bjmgqLRGd:H0B4U+Qo5Ph4ZWkQ5egqLId
Threatray 2'133 similar samples on MalwareBazaar
TLSH 28C48E23F6A14433C1631A389D1B57789C3AFE103A3869862BF46D4C9F797C1397A297
Reporter abuse_ch
Tags:exe nVpn RAT RemcosRAT


Avatar
abuse_ch
Malspam distributing RemcosRAT:

HELO: server1.livepotqatar.com
Sending IP: 198.24.151.201
From: POS@dohabank.com.qa
Subject: POS Statements for Date - _22-07-2020
Attachment: POS Statements for Date - _22-07-2020.zip (contains "POS Statements for Date - _22-07-2020.exe")

RemcosRAT C2:
185.165.153.15:6642

Hosted on nVpn:

% Information related to '185.165.153.0 - 185.165.153.255'

% Abuse contact for '185.165.153.0 - 185.165.153.255' is 'abuse@privacyfirst.sh'

inetnum: 185.165.153.0 - 185.165.153.255
remarks: This prefix is assigned to The PRIVACYFIRST Project, which
remarks: operates infrastructure jointly used by various VPN service
remarks: providers. We have a very strong focus on privacy and freedom.
remarks: In case of abuse, we encourage all international law enforcement
remarks: agencies to get in touch with our abuse contact. Due to the fact
remarks: that we keep no logs of user activities and only share data when
remarks: it is legally required under our jurisdiction, it is very unlikely
remarks: for a demand of user information to be successful. Still, that
remarks: should not deter you from reaching out.
netname: PRIVACYFIRST-AT2
country: AT
admin-c: TPP15-RIPE
tech-c: TPP15-RIPE
org: ORG-TPP6-RIPE
status: ASSIGNED PA
mnt-by: PRIVACYFIRST-MNT
created: 2019-10-18T12:14:26Z
last-modified: 2020-07-14T13:31:45Z
source: RIPE

Intelligence


File Origin
# of uploads :
1
# of downloads :
92
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %AppData% subdirectories
Creating a file in the %temp% directory
Running batch commands
Creating a process with a hidden window
Launching a process
Creating a process from a recently created file
Setting a keyboard event handler
Sending a custom TCP request
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process by context flags manipulation
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 249851 Sample: POS Statements for Date - _... Startdate: 23/07/2020 Architecture: WINDOWS Score: 100 53 Malicious sample detected (through community Yara rule) 2->53 55 Multi AV Scanner detection for submitted file 2->55 57 Detected unpacking (changes PE section rights) 2->57 59 15 other signatures 2->59 9 POS Statements for Date - _22-07-2020.exe 2->9         started        12 gosh.exe 2->12         started        14 gosh.exe 2->14         started        process3 signatures4 63 Maps a DLL or memory area into another process 9->63 16 POS Statements for Date - _22-07-2020.exe 1 5 9->16         started        19 SgrmBroker.exe 9->19         started        21 gosh.exe 12->21         started        23 gosh.exe 14->23         started        process5 file6 43 C:\Users\user\AppData\Roaming\gosh\gosh.exe, PE32 16->43 dropped 45 C:\Users\user\...\gosh.exe:Zone.Identifier, ASCII 16->45 dropped 25 cmd.exe 1 16->25         started        process7 signatures8 65 Uses ping.exe to sleep 25->65 28 gosh.exe 25->28         started        31 PING.EXE 1 25->31         started        34 conhost.exe 25->34         started        process9 dnsIp10 67 Multi AV Scanner detection for dropped file 28->67 69 Detected unpacking (changes PE section rights) 28->69 71 BOT functionalities found, sample is likely a BOT 28->71 73 6 other signatures 28->73 36 gosh.exe 1 3 28->36         started        41 conhost.exe 28->41         started        51 127.0.0.1 unknown unknown 31->51 signatures11 process12 dnsIp13 49 185.165.153.15, 49716, 49720, 49721 DAVID_CRAIGGG Netherlands 36->49 47 C:\Users\user\AppData\Roaming\...\logs.dat, ASCII 36->47 dropped 61 Installs a global keyboard hook 36->61 file14 signatures15
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2020-07-22 10:09:08 UTC
AV detection:
23 of 28 (82.14%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
persistence rat family:remcos
Behaviour
Suspicious use of SetWindowsHookEx
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious behavior: MapViewOfSection
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
Remcos
Malware Config
C2 Extraction:
185.165.153.15:6642
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Remcos
Author:JPCERT/CC Incident Response Group
Description:detect Remcos in memory
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

Executable exe 210560d23e3c023c90bd24ed0d76c68732dc267277fc6adcc3c991cb611bb06a

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments