MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 aea6436203719bbe50d46fdebd3871db5647e02415008b1436df2cceb913916d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 3


Intelligence 3 IOCs YARA 3 File information Comments

SHA256 hash: aea6436203719bbe50d46fdebd3871db5647e02415008b1436df2cceb913916d
SHA3-384 hash: 9e74713591ff6417d09a433bfda936ff00bcb3212e3aef1c6142002a9e151cc3d7750dc3ff61e2d9d847b93dba455800
SHA1 hash: 6bcf844726025fea195bc83b9d2238e58e965395
MD5 hash: 38dca8888bbe8ba8c462e70ea1f8a8d1
humanhash: low-bravo-hotel-high
File name:QUOTATION_02187722017.adobe.exe
Download: download sample
Signature RemcosRAT
File size:471'040 bytes
First seen:2020-04-30 07:37:13 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ca4d88813c6291f3332918c725e8283c (1 x RemcosRAT)
ssdeep 6144:U1FSOJUU+vp9/Amm8sK4Xye30+zFDWQcsQnsZYxzsWeB:2FRN+vp9/vmp4e30+RLcsJZYxNeB
Threatray 678 similar samples on MalwareBazaar
TLSH 59A4BBC25867B676D845CFFFBA62D03B41D33450C68AA0E92F610E96DE913679F34223
Reporter jarumlus
Tags:RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
90
Origin country :
n/a
Vendor Threat Intelligence

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Remcos
Author:JPCERT/CC Incident Response Group
Description:detect Remcos in memory
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_remcos_g0
Author:Daniel Plohmann <daniel.plohmann<at>fkie.fraunhofer.de>

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
VB_APILegacy Visual Basic API usedMSVBVM60.DLL::__vbaSetSystemError
MSVBVM60.DLL::__vbaObjSetAddref
MSVBVM60.DLL::EVENT_SINK_AddRef
MSVBVM60.DLL::__vbaErrorOverflow

Comments