MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 04f483018f53c35976cfd9c4b5191279761a351b3e135a70ae9c5c2b53be154b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 04f483018f53c35976cfd9c4b5191279761a351b3e135a70ae9c5c2b53be154b
SHA3-384 hash: 338822b55618ea77255286b8b2a942f5f0ca9b6211614d39c02d51c1dbc380e7addd93e3ba2f843d0fbd49c794874107
SHA1 hash: 9aa6f705e4f45a4f282367d8bf51a116db70e660
MD5 hash: 2eb56c8ce36c7548607668e84bb56878
humanhash: don-india-finch-winner
File name:Waybill.exe
Download: download sample
Signature RemcosRAT
File size:749'056 bytes
First seen:2021-09-03 17:20:37 UTC
Last seen:2021-09-05 10:30:36 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 683e36fe1155994747e39b9f335ec7e3 (3 x RemcosRAT)
ssdeep 12288:KAQ4TXPbFLYhC0MPsgGsXxItI0X/m/zOOMH9L9T5kLvRJ:KZaZUhJOskXOtNvmb6kLJ
Threatray 549 similar samples on MalwareBazaar
TLSH T1BDF48E167BA2443BF51B4535AE87F3FA9D24AD28190DC0BB1BD71C0FEF3A5863126621
dhash icon 03372481b95d1d3f (8 x RemcosRAT, 4 x Formbook)
Reporter GovCERT_CH
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
3
# of downloads :
814
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Waybill.exe
Verdict:
Malicious activity
Analysis date:
2021-09-03 17:22:22 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
DNS request
Connection attempt
Sending a custom TCP request
Creating a file
Launching a process
Creating a file in the %AppData% subdirectories
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Creates a thread in another existing process (thread injection)
Delayed program exit found
Detected Remcos RAT
Found malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Writes to foreign memory regions
Yara detected Remcos RAT
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Bingoml
Status:
Malicious
First seen:
2021-09-03 17:21:06 UTC
AV detection:
14 of 27 (51.85%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:remotehost persistence rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Adds Run key to start application
Remcos
Malware Config
C2 Extraction:
freelife.hopto.org:2404
freelife1.hopto.org:2404
freelife2.hopto.org:2404
freelife01.hopto.org:2404
freelife3.hopto.org:2404
freelife4.hopto.org:2404
freelife5.hopto.org:2404
Unpacked files
SH256 hash:
04f483018f53c35976cfd9c4b5191279761a351b3e135a70ae9c5c2b53be154b
MD5 hash:
2eb56c8ce36c7548607668e84bb56878
SHA1 hash:
9aa6f705e4f45a4f282367d8bf51a116db70e660
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

Executable exe 04f483018f53c35976cfd9c4b5191279761a351b3e135a70ae9c5c2b53be154b

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments