MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 05b59ecf47b2421de0d6777fbd1498ac5b6c2fc0a8233838e3246195f452175e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 18


Intelligence 18 IOCs YARA 1 File information Comments 1

SHA256 hash: 05b59ecf47b2421de0d6777fbd1498ac5b6c2fc0a8233838e3246195f452175e
SHA3-384 hash: 6240e148962db8c519e474718323eff9ff93c91aa9451be85fa82949127db3cee8b99d9210ea1b1bfd6eac453ee52336
SHA1 hash: 9b3b21beee2a7c690fb4876f964fa9c709bea816
MD5 hash: badfd20331bbd073b8efe745d71b4797
humanhash: football-oklahoma-georgia-tennis
File name:badfd20331bbd073b8efe745d71b4797
Download: download sample
Signature RemcosRAT
File size:529'147 bytes
First seen:2023-03-17 09:51:00 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 61259b55b8912888e90f516ca08dc514 (1'059 x Formbook, 741 x AgentTesla, 431 x GuLoader)
ssdeep 12288:OYfjeJp6VaEn7CCz6U0iibfBDmc55PrY8kxal:OYfjRRneU0iibfBbnY8kxal
Threatray 1'701 similar samples on MalwareBazaar
TLSH T1DDB42309B388C536E8660634AF3B00749F6AEE260D64430F9FD1BA5DFC74512FA17B66
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 98a2a6a08383a200 (9 x RemcosRAT, 3 x Formbook, 1 x AgentTesla)
Reporter zbetcheckin
Tags:32 exe RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
231
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
badfd20331bbd073b8efe745d71b4797
Verdict:
Malicious activity
Analysis date:
2023-03-17 09:54:08 UTC
Tags:
stealer keylogger remcos

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a window
Creating a process from a recently created file
Creating a file in the %AppData% subdirectories
Сreating synchronization primitives
Setting a keyboard event handler
DNS request
Sending a custom TCP request
Enabling the 'hidden' option for recently created files
Sending an HTTP GET request
Reading critical registry keys
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process by context flags manipulation
Unauthorized injection to a recently created process
Stealing user critical data
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Malicious
Threat level:
  10/10
Confidence:
86%
Tags:
comodo nemesis overlay packed remcos shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
phis.troj.spyw.expl.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Installs a global keyboard hook
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Yara detected WebBrowserPassView password recovery tool
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 829174 Sample: 8iKFS2Z0BK.exe Startdate: 17/03/2023 Architecture: WINDOWS Score: 100 54 Multi AV Scanner detection for domain / URL 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 Antivirus detection for URL or domain 2->58 60 5 other signatures 2->60 8 8iKFS2Z0BK.exe 19 2->8         started        11 rbjhkoqfsoc.exe 2->11         started        14 rbjhkoqfsoc.exe 2->14         started        process3 file4 38 C:\Users\user\AppData\...\mvmqykdtoq.exe, PE32 8->38 dropped 16 mvmqykdtoq.exe 1 2 8->16         started        68 Multi AV Scanner detection for dropped file 11->68 20 WerFault.exe 4 10 11->20         started        23 WerFault.exe 10 14->23         started        signatures5 process6 dnsIp7 36 C:\Users\user\AppData\...\rbjhkoqfsoc.exe, PE32 16->36 dropped 46 Multi AV Scanner detection for dropped file 16->46 48 Performs DNS queries to domains with low reputation 16->48 50 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 16->50 52 Maps a DLL or memory area into another process 16->52 25 mvmqykdtoq.exe 2 413 16->25         started        40 192.168.2.1 unknown unknown 20->40 file8 signatures9 process10 dnsIp11 42 top.not2beabused01.xyz 38.117.65.122, 1558, 49696, 49697 RC-01-ASCA United States 25->42 44 geoplugin.net 178.237.33.50, 49700, 80 ATOM86-ASATOM86NL Netherlands 25->44 62 Tries to harvest and steal browser information (history, passwords, etc) 25->62 64 Maps a DLL or memory area into another process 25->64 66 Installs a global keyboard hook 25->66 29 mvmqykdtoq.exe 1 25->29         started        32 mvmqykdtoq.exe 2 25->32         started        34 mvmqykdtoq.exe 1 25->34         started        signatures12 process13 signatures14 70 Tries to steal Instant Messenger accounts or passwords 29->70 72 Tries to steal Mail credentials (via file / registry access) 29->72 74 Tries to harvest and steal browser information (history, passwords, etc) 32->74
Threat name:
Win32.Trojan.Nsisx
Status:
Malicious
First seen:
2023-03-17 09:17:46 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
26 of 38 (68.42%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:sixthclients collection persistence rat spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses Microsoft Outlook accounts
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
NirSoft MailPassView
NirSoft WebBrowserPassView
Nirsoft
Remcos
Malware Config
C2 Extraction:
top.not2beabused01.xyz:1558
sub.not2beabused02.xyz:1558
Unpacked files
SH256 hash:
0af5b1c8eff1fd4a1108f1241d19551a141a28a7019d2360bd72616e3a3702d9
MD5 hash:
4933fea55812619147c9ebbe1e61f5fb
SHA1 hash:
a79f881c76f27a0619378ed6b32f509670fc5cfa
Detections:
Remcos win_remcos_auto
SH256 hash:
73f3ebe66e875aa67b198a080858d83cda0ca4a513e513e2a3430f4dfdb6671b
MD5 hash:
fc8b51725b20f64aa9e8d0aef6c83fcf
SHA1 hash:
f52bf23bd9fd07e3f577b0d9d7936940da267426
SH256 hash:
05b59ecf47b2421de0d6777fbd1498ac5b6c2fc0a8233838e3246195f452175e
MD5 hash:
badfd20331bbd073b8efe745d71b4797
SHA1 hash:
9b3b21beee2a7c690fb4876f964fa9c709bea816
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

Executable exe 05b59ecf47b2421de0d6777fbd1498ac5b6c2fc0a8233838e3246195f452175e

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2023-03-17 09:51:02 UTC

url : hxxp://54.180.140.193/510/vbc.exe