MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 0b4ede6ce80824c7bf66ecf5b42e1032c1039dc8e8b6e462d91be333fe9572e4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RemcosRAT
Vendor detections: 12
| SHA256 hash: | 0b4ede6ce80824c7bf66ecf5b42e1032c1039dc8e8b6e462d91be333fe9572e4 |
|---|---|
| SHA3-384 hash: | d2ced9ad1badd6ae1ee113f10dfe794948cb4bde48c7c983b8a0344265b424fe24e732a9a4387b22a2ac8760419d20d3 |
| SHA1 hash: | e73a5549dd70393b966f5815fe3038f187e3d494 |
| MD5 hash: | 39a26e84308b1e2f61e46d1c4105f91f |
| humanhash: | white-leopard-freddie-violet |
| File name: | Notice to submit_pdf.exe |
| Download: | download sample |
| Signature | RemcosRAT |
| File size: | 1'142'414 bytes |
| First seen: | 2021-08-10 15:20:09 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat) |
| ssdeep | 12288:CQnk3GDYKGcblwywf8B8XaoN1WcYdxww26oq6TNLUfo27wfGC2beF7DvImwZNmrz:WAOcZwlfQ+WcYb66ZfwfhNQXNmrKFu+o |
| Threatray | 2'200 similar samples on MalwareBazaar |
| TLSH | T16135DF42AFF544F7D47A073104B71B306EB6AF201AB6965B57A0353DAD323436E23B92 |
| dhash icon | 12329272e9cc3649 (2 x RemcosRAT, 1 x Formbook, 1 x AgentTesla) |
| Reporter | Anonymous |
| Tags: | exe RemcosRAT |
Intelligence
File Origin
# of uploads :
1
# of downloads :
179
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Notice to submit_pdf.exe
Verdict:
Malicious activity
Analysis date:
2021-08-10 15:20:55 UTC
Tags:
rat remcos keylogger
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Searching for the window
Creating a file
Enabling the 'hidden' option for recently created files
Creating a process from a recently created file
Adding an access-denied ACE
Launching a process
Connection attempt to an infection source
Creating a file in the %AppData% subdirectories
Sending a UDP request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Query of malicious DNS domain
Setting a global event handler for the keyboard
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
Result
Threat name:
Remcos
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Detected Remcos RAT
Drops PE files with a suspicious file extension
Found malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Sigma detected: Suspicious Process Start Without DLL
Writes to foreign memory regions
Yara detected AntiVM autoit script
Yara detected Remcos RAT
Behaviour
Behavior Graph:
Detection:
remcos
Threat name:
Win32.Backdoor.Rescoms
Status:
Malicious
First seen:
2021-08-10 15:21:07 UTC
AV detection:
21 of 46 (45.65%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
remcos
Similar samples:
+ 2'190 additional samples on MalwareBazaar
Result
Malware family:
remcos
Score:
10/10
Tags:
family:nanocore family:remcos botnet:newyear keylogger persistence rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
NanoCore
Remcos
Malware Config
C2 Extraction:
cato.fingusti.club:6609
Unpacked files
SH256 hash:
f8ff8336b9c3036dd6d83cf065f2ecb649786af35dc2d0a2c8ccbf27901f7b6a
MD5 hash:
53d6622008bc5d9718732c4a8fccc4c6
SHA1 hash:
7d00569a7160255e9a144211fb3fac99a176bb1d
Detections:
win_remcos_g0
win_remcos_auto
Parent samples :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 hash:
ab852f52284810b1ef6fc4a2521dbf5130c5ed4cb98ca54310b22dd3529c0c94
MD5 hash:
fbd2a6237d00d90eb947b23feb9f68b0
SHA1 hash:
173dae239c761dcd824c692f3360902d04aa0479
SH256 hash:
0b4ede6ce80824c7bf66ecf5b42e1032c1039dc8e8b6e462d91be333fe9572e4
MD5 hash:
39a26e84308b1e2f61e46d1c4105f91f
SHA1 hash:
e73a5549dd70393b966f5815fe3038f187e3d494
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Delivery method
Distributed via e-mail link
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.