MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 05cbf177e25c8ffe879437b0f5add370b358f0a8a0451b6bfc8bb3d8f2813e3a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 12


Intelligence 12 IOCs YARA 1 File information Comments

SHA256 hash: 05cbf177e25c8ffe879437b0f5add370b358f0a8a0451b6bfc8bb3d8f2813e3a
SHA3-384 hash: 557ce81b3ff22d23880ba62f6a5feb69cd9c70f357cec00b8bb09c255221ffb91735924a44f7bfb6f84c75a6a4cc3df9
SHA1 hash: 07ab5a7709ad3aee12768b514558831406c6b5e1
MD5 hash: 04630e2256c8182388128e0e970edf87
humanhash: may-kansas-chicken-johnny
File name:Waybill.exe
Download: download sample
Signature RemcosRAT
File size:961'536 bytes
First seen:2022-04-01 12:53:01 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash fdad361144afe229033565a59cbcac71 (1 x AveMariaRAT, 1 x Formbook, 1 x RemcosRAT)
ssdeep 12288:cB+PnwfmejogYtFJpFulAJDtHTALKsd/mSf2pSgj3R+li9B8h2+knwcBz:tweOYtFJPulAJDxWKUmSf2x9wSVZwcB
Threatray 738 similar samples on MalwareBazaar
TLSH T15215A062F2818937C023197F7D1BA2E98837BE512E6875563FE53D4C2F76641392A2C3
File icon (PE):PE icon
dhash icon bab0f1ecccce9e98 (17 x Formbook, 4 x SnakeKeylogger, 4 x RemcosRAT)
Reporter GovCERT_CH
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
227
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Creating a file
Launching a process
Creating a file in the %AppData% subdirectories
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckScreenResolution
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
control.exe keylogger packed remcos zusy
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Creates a thread in another existing process (thread injection)
Delayed program exit found
Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Program Location with Network Connections
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Remcos RAT
Yara detected WebBrowserPassView password recovery tool
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 601458 Sample: Waybill.exe Startdate: 01/04/2022 Architecture: WINDOWS Score: 100 64 Found malware configuration 2->64 66 Malicious sample detected (through community Yara rule) 2->66 68 Icon mismatch, binary includes an icon from a different legit application in order to fool users 2->68 70 6 other signatures 2->70 7 Waybill.exe 1 16 2->7         started        12 Enjfqep.exe 15 2->12         started        14 Enjfqep.exe 15 2->14         started        process3 dnsIp4 38 l-0003.dc-msedge.net 13.107.43.12, 443, 49765, 49767 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 7->38 40 q3k7aa.by.files.1drv.com 7->40 46 2 other IPs or domains 7->46 34 C:\Users\Public\Librariesnjfqep.exe, PE32 7->34 dropped 78 Writes to foreign memory regions 7->78 80 Creates a thread in another existing process (thread injection) 7->80 82 Injects a PE file into a foreign processes 7->82 16 logagent.exe 2 3 7->16         started        42 l-0004.dc-msedge.net 13.107.43.13, 443, 49772, 49779 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 12->42 44 q3k7aa.by.files.1drv.com 12->44 48 2 other IPs or domains 12->48 20 DpiScaling.exe 12->20         started        50 3 other IPs or domains 14->50 22 logagent.exe 14->22         started        file5 signatures6 process7 dnsIp8 36 flexyval01.hopto.org 20.110.197.26, 2404, 49771, 49781 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 16->36 54 Contains functionality to steal Chrome passwords or cookies 16->54 56 Contains functionality to inject code into remote processes 16->56 58 Contains functionality to steal Firefox passwords or cookies 16->58 60 Injects a PE file into a foreign processes 16->60 24 logagent.exe 1 16->24         started        27 logagent.exe 16->27         started        29 logagent.exe 2 16->29         started        32 6 other processes 16->32 62 Delayed program exit found 20->62 signatures9 process10 dnsIp11 72 Tries to steal Instant Messenger accounts or passwords 24->72 74 Tries to steal Mail credentials (via file / registry access) 24->74 52 192.168.2.1 unknown unknown 29->52 76 Tries to harvest and steal browser information (history, passwords, etc) 29->76 signatures12
Threat name:
Win32.Spyware.AveMaria
Status:
Malicious
First seen:
2022-04-01 12:54:08 UTC
File Type:
PE (Exe)
Extracted files:
39
AV detection:
19 of 26 (73.08%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:modiloader family:remcos botnet:remotehost persistence rat trojan
Behaviour
Suspicious use of WriteProcessMemory
Program crash
Adds Run key to start application
ModiLoader, DBatLoader
Remcos
Malware Config
C2 Extraction:
flexyval01.hopto.org:2404
flexyval02.hopto.org:2404
flexyval03.hopto.org:2404
flexyval04.hopto.org:2404
flexyval06.hopto.org:2404
flexyval05.hopto.org:2404
flexyval07.hopto.org:2404
Unpacked files
SH256 hash:
ed6399ad3b96cddae27ee354214b1119b2b5b29d99f88123a958bf9c0da811ae
MD5 hash:
ffd882d8b314678baf8be615af52ed5f
SHA1 hash:
68a3a60008015fc16df4f9b13f9c29b7e677405e
Detections:
win_dbatloader_w0
SH256 hash:
05cbf177e25c8ffe879437b0f5add370b358f0a8a0451b6bfc8bb3d8f2813e3a
MD5 hash:
04630e2256c8182388128e0e970edf87
SHA1 hash:
07ab5a7709ad3aee12768b514558831406c6b5e1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

Executable exe 05cbf177e25c8ffe879437b0f5add370b358f0a8a0451b6bfc8bb3d8f2813e3a

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments