MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0294cdf9c9c38ea1f2261b63206293516944cffef513e12701c3092a9244c0b7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 14


Intelligence 14 IOCs YARA 10 File information Comments

SHA256 hash: 0294cdf9c9c38ea1f2261b63206293516944cffef513e12701c3092a9244c0b7
SHA3-384 hash: 85341e68537044046f54aca58b13c2dacdb07672b377c7cc9d484e0e32e125041ed10cae15847cd99227b4ba133fae4d
SHA1 hash: e1fca898451b04cef664b94a5ab33089b09932a9
MD5 hash: cb43cfa544d997cbbf5ca1d3e437fb92
humanhash: may-connecticut-eighteen-equal
File name:cb43cfa544d997cbbf5ca1d3e437fb92.exe
Download: download sample
Signature RemcosRAT
File size:12'045'312 bytes
First seen:2023-04-11 09:32:54 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 49152:xoH566E2qvkjUPlrrQMEwNQ7uR+crlECdJxnXFcA/qDMOx5JJx6mNqNbHhBA8PNb:W3jUVP67uMcrSCVSLDMOxnJsFZOBs0
TLSH T1AFC61913FD8699A2F2559BB3C4E71C546FA8E8436697E209B48E334D0F33B762C06617
TrID 30.6% (.SCR) Windows screen saver (13097/50/3)
24.5% (.EXE) Win64 Executable (generic) (10523/12/4)
15.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
10.5% (.EXE) Win32 Executable (generic) (4505/5/1)
4.8% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter abuse_ch
Tags:exe RAT RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
277
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2023-04-10 14:47:02 UTC
Tags:
rhadamanthys loader remcos trojan rat azorult

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Creating a file in the %AppData% subdirectories
Unauthorized injection to a recently created process
Creating a file
Setting a keyboard event handler
DNS request
Launching a process
Sending a custom TCP request
Enabling the 'hidden' option for recently created files
Using the Windows Management Instrumentation requests
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
remcos
Result
Verdict:
MALICIOUS
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
Connects to many ports of the same IP (likely port scanning)
Encrypted powershell cmdline option found
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 844530 Sample: HM1mHg98rd.exe Startdate: 11/04/2023 Architecture: WINDOWS Score: 100 44 petronian.ac.ug 2->44 50 Malicious sample detected (through community Yara rule) 2->50 52 Multi AV Scanner detection for submitted file 2->52 54 Yara detected UAC Bypass using CMSTP 2->54 56 3 other signatures 2->56 8 HM1mHg98rd.exe 1 5 2->8         started        12 Hwjqncovk.exe 1 2->12         started        14 Hwjqncovk.exe 2->14         started        signatures3 process4 file5 32 C:\Users\user\AppData\...\Hwjqncovk.exe, PE32 8->32 dropped 34 C:\Users\...\Hwjqncovk.exe:Zone.Identifier, ASCII 8->34 dropped 36 C:\Users\user\AppData\...\HM1mHg98rd.exe.log, ASCII 8->36 dropped 58 Injects a PE file into a foreign processes 8->58 16 HM1mHg98rd.exe 3 3 8->16         started        20 cmd.exe 1 8->20         started        22 HM1mHg98rd.exe 8->22         started        60 Multi AV Scanner detection for dropped file 12->60 62 Machine Learning detection for dropped file 12->62 24 Hwjqncovk.exe 12->24         started        26 Hwjqncovk.exe 14->26         started        signatures6 process7 dnsIp8 38 marcapinyo.ug 37.0.14.204, 49698, 49699, 49701 WKD-ASIE Netherlands 16->38 40 192.168.2.1 unknown unknown 16->40 42 3 other IPs or domains 16->42 46 Installs a global keyboard hook 16->46 48 Encrypted powershell cmdline option found 20->48 28 powershell.exe 22 20->28         started        30 conhost.exe 20->30         started        signatures9 process10
Threat name:
ByteCode-MSIL.Trojan.Zilla
Status:
Malicious
First seen:
2023-04-09 05:29:11 UTC
File Type:
PE (.Net Exe)
Extracted files:
28
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:04072023 persistence rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
Remcos
Malware Config
C2 Extraction:
petronian.ac.ug:65213
marcapinyo.ug:65213
platitinas.ac.ug:65213
masontralacs.ug:65213
Unpacked files
SH256 hash:
63ab6c02a4750b1d102f2e4b31b453e12f797182f17fbac1d6cfc7ff9caeab70
MD5 hash:
cc2beefe85be3f6b49f98c48ebde1bd0
SHA1 hash:
ed4f35c997bae46b2e78c76d172f89f5cbb0f3be
SH256 hash:
ff8c24bce1eb009f0d5c47a09b96caf02726c285cea0d635082ad4da27e63d1b
MD5 hash:
9d6ec6072ee1814a4a01d1eb3fb67ba1
SHA1 hash:
d0b416de1c900b6bcb35dc182b2e8744f16c3289
SH256 hash:
251a0b9cbb89df7b60ac8490043c43be10566c0441c0f6a12d3fc66d696bc67e
MD5 hash:
115beb739784c393cd20f5dda288ed57
SHA1 hash:
6f42f0825233cc9b4d0dfc4959c5373324132e5a
SH256 hash:
c7f81bdf5a7a1a1a2fc50fc886b7aad8c2fb76da8ce44bfc4878b0df54a9de6e
MD5 hash:
f96f61bb0ab663a2ff49297c9aaedafb
SHA1 hash:
01c20520a27114a85911f03c19638e5c249256d7
Detections:
Remcos win_remcos_auto
SH256 hash:
0294cdf9c9c38ea1f2261b63206293516944cffef513e12701c3092a9244c0b7
MD5 hash:
cb43cfa544d997cbbf5ca1d3e437fb92
SHA1 hash:
e1fca898451b04cef664b94a5ab33089b09932a9
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:crime_win32_ransom_avaddon_1
Author:@VK_Intel
Description:Detects Avaddon ransomware
Reference:https://twitter.com/VK_Intel/status/1300944441390370819
Rule name:iexplorer_remcos
Author:iam-py-test
Description:Detect iexplorer being taken over by Remcos
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM
Author:ditekSHen
Description:Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Rule name:pe_imphash
Rule name:Remcos
Author:kevoreilly
Description:Remcos Payload
Rule name:REMCOS_RAT_variants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Windows_Trojan_Remcos_b296e965
Author:Elastic Security
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.remcos.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

Executable exe 0294cdf9c9c38ea1f2261b63206293516944cffef513e12701c3092a9244c0b7

(this sample)

  
Delivery method
Distributed via web download

Comments