MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0a4118fe4308cbb2db46ba76de82d70345b00cd3ec93167056fc572e8d4c4f64. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 15


Intelligence 15 IOCs YARA File information Comments

SHA256 hash: 0a4118fe4308cbb2db46ba76de82d70345b00cd3ec93167056fc572e8d4c4f64
SHA3-384 hash: 0316fd1795d66bce23e50542ba91a9dd1dd5df10f90e9211aed659d1ece592fe4da621b5f255b22337afcce8aa57e8e8
SHA1 hash: 02ea8b0bded4e1ea160d7c8ac767499886eafefc
MD5 hash: 940644c823ea0ef593f724cf35b7b960
humanhash: november-tango-diet-echo
File name:Banco Santander_Cópia de Pagamento.pdf.vba
Download: download sample
Signature RemcosRAT
File size:8'432 bytes
First seen:2026-03-31 17:41:24 UTC
Last seen:Never
File type:Batch (bat) bat
MIME type:text/x-msdos-batch
ssdeep 192:NBeUcyimtOOvXcai5pwz2M9nQSls0O36Fp8bKX0Qq5HZp8bxO5X0QqUls0ZpnQFc:X2u4xZskB
Threatray 2'225 similar samples on MalwareBazaar
TLSH T19D02296C4FC3B2CF6136B3EAA1B60590DBAD803F2539F5A5D721F5384891DCD92290E8
Magika batch
Reporter BastianHein
Tags:bat RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
55
Origin country :
CL CL
Vendor Threat Intelligence
Gathering data
Malware family:
ID:
1
File name:
BancoSantander_CopiadePagamento.pdf.bat
Verdict:
Malicious activity
Analysis date:
2026-03-31 09:42:10 UTC
Tags:
loader autoit rat remcos

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
95.7%
Tags:
obfuscated shell sage
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Сreating synchronization primitives
DNS request
Creating a file in the %temp% subdirectories
Creating a process with a hidden window
Creating a file
Creating a process from a recently created file
Creating a window
Reading critical registry keys
Launching a service
Changing a file
Query of malicious DNS domain
Connection attempt to an infection source
Sending a TCP request to an infection source
Stealing user critical data
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
base64 encrypted masquerade obfuscated obfuscated powershell
Verdict:
Malicious
File Type:
unix shell
First seen:
2026-03-31T05:28:00Z UTC
Last seen:
2026-04-02T15:24:00Z UTC
Hits:
~1000
Detections:
HEUR:Trojan.BAT.Generic
Threat name:
Win32.Trojan.Egairtigado
Status:
Malicious
First seen:
2026-03-31 09:42:18 UTC
File Type:
Text (Batch)
AV detection:
9 of 24 (37.50%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:remotehost collection discovery rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Accesses Microsoft Outlook accounts
Executes dropped EXE
Badlisted process makes network request
Detected Nirsoft tools
Remcos
Remcos family
Malware Config
C2 Extraction:
178.16.53.54:8972
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments