MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 04f483018f53c35976cfd9c4b5191279761a351b3e135a70ae9c5c2b53be154b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RemcosRAT
Vendor detections: 10
| SHA256 hash: | 04f483018f53c35976cfd9c4b5191279761a351b3e135a70ae9c5c2b53be154b |
|---|---|
| SHA3-384 hash: | 338822b55618ea77255286b8b2a942f5f0ca9b6211614d39c02d51c1dbc380e7addd93e3ba2f843d0fbd49c794874107 |
| SHA1 hash: | 9aa6f705e4f45a4f282367d8bf51a116db70e660 |
| MD5 hash: | 2eb56c8ce36c7548607668e84bb56878 |
| humanhash: | don-india-finch-winner |
| File name: | Waybill.exe |
| Download: | download sample |
| Signature | RemcosRAT |
| File size: | 749'056 bytes |
| First seen: | 2021-09-03 17:20:37 UTC |
| Last seen: | 2021-09-05 10:30:36 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 683e36fe1155994747e39b9f335ec7e3 (3 x RemcosRAT) |
| ssdeep | 12288:KAQ4TXPbFLYhC0MPsgGsXxItI0X/m/zOOMH9L9T5kLvRJ:KZaZUhJOskXOtNvmb6kLJ |
| Threatray | 549 similar samples on MalwareBazaar |
| TLSH | T1BDF48E167BA2443BF51B4535AE87F3FA9D24AD28190DC0BB1BD71C0FEF3A5863126621 |
| dhash icon | 03372481b95d1d3f (8 x RemcosRAT, 4 x Formbook) |
| Reporter | |
| Tags: | exe RemcosRAT |
Intelligence
File Origin
# of uploads :
3
# of downloads :
814
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Waybill.exe
Verdict:
Malicious activity
Analysis date:
2021-09-03 17:22:22 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Sending a UDP request
DNS request
Connection attempt
Sending a custom TCP request
Creating a file
Launching a process
Creating a file in the %AppData% subdirectories
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process
Malware family:
REMCOS
Verdict:
Malicious
Result
Threat name:
Remcos
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Creates a thread in another existing process (thread injection)
Delayed program exit found
Detected Remcos RAT
Found malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Writes to foreign memory regions
Yara detected Remcos RAT
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Bingoml
Status:
Malicious
First seen:
2021-09-03 17:21:06 UTC
AV detection:
14 of 27 (51.85%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
remcos
Similar samples:
+ 539 additional samples on MalwareBazaar
Result
Malware family:
remcos
Score:
10/10
Tags:
family:remcos botnet:remotehost persistence rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Adds Run key to start application
Remcos
Malware Config
C2 Extraction:
freelife.hopto.org:2404
freelife1.hopto.org:2404
freelife2.hopto.org:2404
freelife01.hopto.org:2404
freelife3.hopto.org:2404
freelife4.hopto.org:2404
freelife5.hopto.org:2404
freelife1.hopto.org:2404
freelife2.hopto.org:2404
freelife01.hopto.org:2404
freelife3.hopto.org:2404
freelife4.hopto.org:2404
freelife5.hopto.org:2404
Unpacked files
SH256 hash:
04f483018f53c35976cfd9c4b5191279761a351b3e135a70ae9c5c2b53be154b
MD5 hash:
2eb56c8ce36c7548607668e84bb56878
SHA1 hash:
9aa6f705e4f45a4f282367d8bf51a116db70e660
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.