MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 07a3c580cbf48fdcc0bfd313eb490b1a45690c71b5bcedf386c8e4e3f1fe0581. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RemcosRAT
Vendor detections: 13
| SHA256 hash: | 07a3c580cbf48fdcc0bfd313eb490b1a45690c71b5bcedf386c8e4e3f1fe0581 |
|---|---|
| SHA3-384 hash: | aa9a3e001f0bf545177b9ac93ef810b5b845e107aa0ee45d4be58dd2aa111f81ae92fc4ddb210d64914914b2543d2dab |
| SHA1 hash: | ac87d1a9565defc3c3b8bbc315c4e5d4013330bb |
| MD5 hash: | d960d444a42ab3d68c7592d6cf619f89 |
| humanhash: | mississippi-aspen-fish-seven |
| File name: | Inquiry No. 301-2022-ST00.exe |
| Download: | download sample |
| Signature | RemcosRAT |
| File size: | 833'536 bytes |
| First seen: | 2022-04-20 07:17:42 UTC |
| Last seen: | 2022-04-20 12:46:09 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 24576:x5kaJgFqFXrKPK677IUWwY8bU19H49Qm/rn35DtJ:x1J45C677IUlbgYQmr5Dt |
| Threatray | 1'968 similar samples on MalwareBazaar |
| TLSH | T12805220895E843D8E87F17FD9E76B640D7FAD8736A0AF70D0E8A68C57AE73428444931 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4505/5/1) 2.0% (.EXE) Win16/32 Executable Delphi generic (2072/23) |
| File icon (PE): | |
| dhash icon | 0000000000000000 (872 x AgentTesla, 496 x Formbook, 296 x RedLineStealer) |
| Reporter | |
| Tags: | exe RemcosRAT |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
0d08258ee5cde4341d641b04c11d01427309a865ef0ae0601d5a8663ae3a79eb
287899f0c2ed9274def6614ce3f658335cb1f832e1afbfc1d8e3076bdf097054
e9f0de091b5fd4d63fb10f0deca4e360a78341675f2bbef4c03f8cb89c081844
451ab9846f3c63a6b5f2e25ab5f58bb4180cf414062f52e280bd98eafea81963
36eae83dd16e98d3f62475ff48c33f731651e41ff52b0558b509d7a4d665e0b8
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer |
|---|---|
| Author: | ditekSHen |
| Description: | detects Windows exceutables potentially bypassing UAC using eventvwr.exe |
| Rule name: | pe_imphash |
|---|
| Rule name: | remcos_rat |
|---|---|
| Author: | jeFF0Falltrades |
| Rule name: | REMCOS_RAT_variants |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | win_remcos_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.remcos. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.