MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a684a7d895b3f2ca56b7f169e595012c7aa82a66d58f91ef9f97cbe01134e549. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 3


Intelligence 3 IOCs YARA 3 File information Comments

SHA256 hash: a684a7d895b3f2ca56b7f169e595012c7aa82a66d58f91ef9f97cbe01134e549
SHA3-384 hash: 2affd9c0396490f377d5a4be468d575ec88082bf08a13428c07ee1ccf269c8f76a0db28900e8c49a3ec22df93e4e6183
SHA1 hash: 85c16c61afff7d86b59520f180cf590e5c0188fa
MD5 hash: 25520788c241806059de2cf70171765b
humanhash: fifteen-ceiling-robert-oxygen
File name:POEA ADVISORY NO. 30, 2020.pdf.exe
Download: download sample
Signature RemcosRAT
File size:1'155'348 bytes
First seen:2020-04-15 16:40:08 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 00be6e6c4f9e287672c8301b72bdabf3 (116 x RedLineStealer, 70 x AsyncRAT, 55 x AgentTesla)
ssdeep 24576:bNA3R5drX1Ufydevzw4SQ3afA8Mw69O+Au1h6LId7nT1RMwaMm3CfBomC:G51UfakU4SSuN69Oi1h6LIdzTXM76fBU
Threatray 273 similar samples on MalwareBazaar
TLSH A5350212E6D7C1BFF063083F4D796B61B8BCBD301A16CD6EA3845E59D5206C1A2D1AB3
Reporter c_APT_ure
Tags:RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
87
Origin country :
n/a
Vendor Threat Intelligence

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_RemcosRAT
Author:abuse.ch
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_remcos_g0
Author:Daniel Plohmann <daniel.plohmann<at>fkie.fraunhofer.de>

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
GDI_PLUS_APIInterfaces with Graphicsgdiplus.dll::GdiplusStartup
gdiplus.dll::GdiplusShutdown
gdiplus.dll::GdipAlloc
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::LoadLibraryExA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetSystemInfo
KERNEL32.dll::GetStartupInfoW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::AllocConsole
KERNEL32.dll::AttachConsole
KERNEL32.dll::WriteConsoleW
KERNEL32.dll::FreeConsole
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateHardLinkW
KERNEL32.dll::CreateFileW
KERNEL32.dll::CreateFileMappingW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::MoveFileW
KERNEL32.dll::MoveFileExW

Comments