MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 037222fe01d316ca4fb55cb263065fa2327e29d3d1d74d0ca75e1d162cc48b67. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 14


Intelligence 14 IOCs YARA 2 File information Comments 1

SHA256 hash: 037222fe01d316ca4fb55cb263065fa2327e29d3d1d74d0ca75e1d162cc48b67
SHA3-384 hash: 92eb1abd3b74cf3184967abb5590a67d5a46b4ebbfced9c86b33c20891233fc632611f7c52761b81d52cf3767a80040b
SHA1 hash: 6bf53ac01cdd0ba1dfa7ea6ec6a01ae4f0785168
MD5 hash: 97ff652d7a6d48be8416e8dd12a916ae
humanhash: oklahoma-mirror-washington-winner
File name:97ff652d7a6d48be8416e8dd12a916ae
Download: download sample
Signature RemcosRAT
File size:2'423'808 bytes
First seen:2022-12-01 00:15:03 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'600 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 49152:ubc9zr7X2z9KVn51yLiQ1X09kJz3y0n2FnR2YO2e0X/K0H0TID4:uGzX+9k51XQN6831uR3a0XSs0s
Threatray 3'473 similar samples on MalwareBazaar
TLSH T1A3B5333572554E8AC77D44304F99E786E124E2BF6C1B0FEF25EC9121C2AE764829A373
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon 489669d8d8699648 (53 x AgentTesla, 24 x SnakeKeylogger, 16 x AveMariaRAT)
Reporter zbetcheckin
Tags:32 exe RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
177
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
REVISED CONTRACT AGREEMENT.docx
Verdict:
Malicious activity
Analysis date:
2022-11-30 09:34:49 UTC
Tags:
opendir trojan exploit cve-2017-11882 loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Searching for the window
Launching a process
Creating a window
Sending an HTTP GET request
Сreating synchronization primitives
Creating a process with a hidden window
Sending a custom TCP request
Unauthorized injection to a recently created process
Launching the default Windows debugger (dwwin.exe)
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Encrypted powershell cmdline option found
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Yara detected Remcos RAT
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.Scarsi
Status:
Malicious
First seen:
2022-11-30 09:53:16 UTC
File Type:
PE (.Net Exe)
Extracted files:
10
AV detection:
19 of 26 (73.08%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:tesst collection persistence rat spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses Microsoft Outlook accounts
Adds Run key to start application
Checks computer location settings
Reads user/profile data of web browsers
NirSoft MailPassView
NirSoft WebBrowserPassView
Nirsoft
Remcos
Malware Config
C2 Extraction:
107.174.202.148:14207
Unpacked files
SH256 hash:
541f75be5a9e0c0cad807b83cd0b56f5b17688ce07aa116eeafe1994eb1e955c
MD5 hash:
b6e6b17056d37194791c5187a3a897d6
SHA1 hash:
8e6747d5c254b0d913979dfeff89f169a8810e5c
Detections:
Remcos win_remcos_auto
SH256 hash:
eed90a45c8449f8fbd55ab76c42a6b5dba40153bad93eae582d94c765497ec92
MD5 hash:
8df18484a5c988bf86f6f80f8a9c1b9a
SHA1 hash:
8ad5050c6d4e5b19eabd63ac9f59dbcb2d824908
SH256 hash:
e91fedafb4eb6c3865718cce95821884cba78bc0ce64e7dcd3e51807799eed54
MD5 hash:
1bcef64ad70d7df84a5ee9734f4bd4ac
SHA1 hash:
2d703d270f69b7d613a902511bb30665b65fe568
SH256 hash:
037222fe01d316ca4fb55cb263065fa2327e29d3d1d74d0ca75e1d162cc48b67
MD5 hash:
97ff652d7a6d48be8416e8dd12a916ae
SHA1 hash:
6bf53ac01cdd0ba1dfa7ea6ec6a01ae4f0785168
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

Executable exe 037222fe01d316ca4fb55cb263065fa2327e29d3d1d74d0ca75e1d162cc48b67

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-12-01 00:15:05 UTC

url : hxxp://172.245.142.71/125/vbc.exe