MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a93544715a31933d1ac1584d3a28bc7121872569baa1e3a7ecfed06f2d65031c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: a93544715a31933d1ac1584d3a28bc7121872569baa1e3a7ecfed06f2d65031c
SHA3-384 hash: bc902cf72f4c6fd2c03f7104507863b2c4458b0c09b4492d7d19ee80f28e5e42943b9b538775657b52f34661d6c31719
SHA1 hash: da4253df5c423d268a4f80183e12660bba912d1a
MD5 hash: b7101bead60557328c44d9a5877c234a
humanhash: juliet-bakerloo-quebec-wyoming
File name:Twcfjyk.exe
Download: download sample
File size:766'976 bytes
First seen:2020-07-02 14:19:08 UTC
Last seen:2020-07-02 15:17:01 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 6c34875e6659ad3dc03a594f51a56afe (1 x AgentTesla, 1 x FormBook)
ssdeep 12288:fo3+zXare66YJO0OPP+lLq8UX5x5FpMLKe+ScgBVrYM5PVoG419BG:g3dlO0C8LqhuL1TYMN4Pg
Threatray 5'334 similar samples on MalwareBazaar
TLSH 53F47C62B2D10477D1631A78DC2FB3B5592ABE442DE86A4727F4BD088F7D341382B2D6
Reporter cocaman
Tags:exe

Intelligence


File Origin
# of uploads :
3
# of downloads :
86
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.Remcosrat
Status:
Malicious
First seen:
2020-07-02 14:21:04 UTC
File Type:
PE (Exe)
Extracted files:
45
AV detection:
25 of 29 (86.21%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
persistence spyware
Behaviour
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Modifies Internet Explorer settings
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: MapViewOfSection
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Suspicious behavior: MapViewOfSection
Suspicious use of SendNotifyMessage
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetThreadContext
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Adds Run entry to start application
Legitimate hosting services abused for malware hosting/C2
Legitimate hosting services abused for malware hosting/C2
Adds Run entry to start application
Reads user/profile data of web browsers
Reads user/profile data of web browsers
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Executable exe a93544715a31933d1ac1584d3a28bc7121872569baa1e3a7ecfed06f2d65031c

(this sample)

Comments