MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0ca246e6325bfa1bd4aa4f743a259d4c3553a316a44665a5a21d5d5132b893c0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 14


Intelligence 14 IOCs YARA 8 File information Comments

SHA256 hash: 0ca246e6325bfa1bd4aa4f743a259d4c3553a316a44665a5a21d5d5132b893c0
SHA3-384 hash: 9b64de79e5af008b9573aa8fa9484b039fa150f1b04ba59d16af63c968f0fd69e67fa771e8a7b7726c0a3cc8f674ca7b
SHA1 hash: 9a96746b27945440c362402b161daac34ce00a84
MD5 hash: 839e1f8705362603a1dcbb5adfe6d6e1
humanhash: massachusetts-minnesota-washington-jig
File name:file
Download: download sample
Signature RemcosRAT
File size:1'623'504 bytes
First seen:2023-01-27 15:53:37 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 23c3663e1dbe12e368c188c8190c3007 (1 x RemcosRAT)
ssdeep 24576:/pBtKkpXwKPHp0EVWnqMKMklXZ8N7Y5jQoLOnrq/aCVXcA9:9TdvMKMklXSN7YDOrqyCVXv9
TLSH T1F5759BD57049F94ADBFD1B72453C2FC0EAA9E1431427F36B9A68609C0EA331854DED2E
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 96dac8b24e35939c (1 x RemcosRAT)
Reporter jstrosch
Tags:exe RemcosRAT signed

Code Signing Certificate

Organisation:stockphotoeditor.com
Issuer:Amazon
Algorithm:sha256WithRSAEncryption
Valid from:2022-07-31T00:00:00Z
Valid to:2023-08-29T23:59:59Z
Serial number: 0ef7f1117a71e5bebb00171d57fd84c2
Thumbprint Algorithm:SHA256
Thumbprint: 907fe851246a0a263f01bdc66fbab048000668a9b17f04bb574edca9afeed5be
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
197
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
tloader.exe
Verdict:
Malicious activity
Analysis date:
2023-01-21 20:52:35 UTC
Tags:
rat remcos keylogger

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
DNS request
Creating a file
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
CheckCmdLine
EvasionQueryPerformanceCounter
EvasionGetTickCount
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Detected unpacking (creates a PE file in dynamic memory)
Installs a global keyboard hook
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Self deletion via cmd or bat file
Uses dynamic DNS services
Uses ping.exe to check the status of other devices and networks
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 793102 Sample: file.exe Startdate: 27/01/2023 Architecture: WINDOWS Score: 100 45 Multi AV Scanner detection for domain / URL 2->45 47 Malicious sample detected (through community Yara rule) 2->47 49 Antivirus detection for URL or domain 2->49 51 7 other signatures 2->51 7 file.exe 10 2->7         started        12 fon gehewico.exe 6 2->12         started        process3 dnsIp4 41 zy6k1kplgndf1jsipbljb4xjuw.jy6o39hmfkk5bs4ukrf3 7->41 31 C:\Users\user\...\fon gehewico.exe, PE32 7->31 dropped 33 C:\Users\...\fon gehewico.exe:Zone.Identifier, ASCII 7->33 dropped 53 Detected unpacking (creates a PE file in dynamic memory) 7->53 55 Self deletion via cmd or bat file 7->55 57 Uses schtasks.exe or at.exe to add and modify task schedules 7->57 14 cmd.exe 1 7->14         started        17 fon gehewico.exe 2 7 7->17         started        20 schtasks.exe 1 7->20         started        43 zy6k1kplgndf1jsipbljb4xjuw.jy6o39hmfkk5bs4ukrf3 12->43 file5 signatures6 process7 dnsIp8 59 Uses ping.exe to check the status of other devices and networks 14->59 22 PING.EXE 1 14->22         started        25 conhost.exe 14->25         started        27 chcp.com 1 14->27         started        35 rlbotz.duckdns.org 80.76.51.46, 2404 CLOUDCOMPUTINGDE Bulgaria 17->35 37 zy6k1kplgndf1jsipbljb4xjuw.jy6o39hmfkk5bs4ukrf3 17->37 61 Installs a global keyboard hook 17->61 29 conhost.exe 20->29         started        signatures9 process10 dnsIp11 39 127.0.0.1 unknown unknown 22->39
Threat name:
Win32.Trojan.Strab
Status:
Malicious
First seen:
2023-01-19 18:28:20 UTC
File Type:
PE (Exe)
Extracted files:
7
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:thorami-v5 rat
Behaviour
Creates scheduled task(s)
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks computer location settings
Deletes itself
Loads dropped DLL
Executes dropped EXE
Remcos
Malware Config
C2 Extraction:
rlbotz.duckdns.org:2404
80.76.51.46:2404
Unpacked files
SH256 hash:
96d12aa7cde83597672af13d3be82a7e99fd5df9960413fe1260f2a8eb2b3979
MD5 hash:
7b3bf829cbf561d8448186e511fa2e80
SHA1 hash:
1e2504a0ad7dea759a0ae35932f4e77aa1a7da86
SH256 hash:
0ca246e6325bfa1bd4aa4f743a259d4c3553a316a44665a5a21d5d5132b893c0
MD5 hash:
839e1f8705362603a1dcbb5adfe6d6e1
SHA1 hash:
9a96746b27945440c362402b161daac34ce00a84
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:iexplorer_remcos
Author:iam-py-test
Description:Detect iexplorer being taken over by Remcos
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM
Author:ditekSHen
Description:Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:Remcos
Author:kevoreilly
Description:Remcos Payload
Rule name:REMCOS_RAT_variants
Rule name:Windows_Trojan_Remcos_b296e965
Author:Elastic Security
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.remcos.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

Executable exe 0ca246e6325bfa1bd4aa4f743a259d4c3553a316a44665a5a21d5d5132b893c0

(this sample)

  
Delivery method
Distributed via web download

Comments