MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0cdbbad2c981d41b9a576a234ecf97cfeb8ed01e869375f3fd3b782310ea1649. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 12


Intelligence 12 IOCs YARA 10 File information Comments

SHA256 hash: 0cdbbad2c981d41b9a576a234ecf97cfeb8ed01e869375f3fd3b782310ea1649
SHA3-384 hash: ca2357094aefcfe647117cb944a4f7d9091dede6d0232cfc41d7791d3e3442a4220fbf7b7eadc345abfe034151594200
SHA1 hash: f8f93bb593da20a1e7625bc9dfcdcd4416d88d25
MD5 hash: fadda1f820898325624fceea30e15718
humanhash: east-high-east-east
File name:fadda1f820898325624fceea30e15718.exe
Download: download sample
Signature RemcosRAT
File size:330'240 bytes
First seen:2021-08-26 12:35:46 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'658 x AgentTesla, 19'469 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 6144:N7dcYwbBxpCLHPc89ZcDNz8SfAy2acpwTS4x:NhcYsBxpOHPc8voNz94yoCS
Threatray 1'965 similar samples on MalwareBazaar
TLSH T1446412056180F8DAE16E09B4DAB38EF1B1B295384B36ADEC3C907637B9033D047E6563
dhash icon 489669d8d8699648 (53 x AgentTesla, 24 x SnakeKeylogger, 16 x AveMariaRAT)
Reporter abuse_ch
Tags:exe RAT RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
131
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
fadda1f820898325624fceea30e15718.exe
Verdict:
Malicious activity
Analysis date:
2021-08-26 12:37:49 UTC
Tags:
rat remcos

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Creating a file in the %AppData% directory
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file
DNS request
Connection attempt
Sending a custom TCP request
Launching the default Windows debugger (dwwin.exe)
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Contains functionality to capture and log keystrokes
Contains functionality to detect virtual machines (IN, VMware)
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Detected Remcos RAT
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 472358 Sample: SS5dO9S75j.exe Startdate: 26/08/2021 Architecture: WINDOWS Score: 100 62 Malicious sample detected (through community Yara rule) 2->62 64 Multi AV Scanner detection for submitted file 2->64 66 Detected Remcos RAT 2->66 68 4 other signatures 2->68 7 SS5dO9S75j.exe 1 7 2->7         started        11 win32.exe 5 2->11         started        13 win32.exe 2 2->13         started        process3 file4 28 C:\Users\user\AppData\Roaming\win32.exe, PE32 7->28 dropped 30 C:\Users\user\AppData\...\SS5dO9S75j.exe, PE32 7->30 dropped 32 C:\Users\user\...\win32.exe:Zone.Identifier, ASCII 7->32 dropped 40 2 other malicious files 7->40 dropped 70 Writes to foreign memory regions 7->70 72 Injects a PE file into a foreign processes 7->72 15 SS5dO9S75j.exe 1 1 7->15         started        34 C:\Users\user\AppData\Local\Temp\win32.exe, PE32 11->34 dropped 36 C:\Users\user\...\win32.exe:Zone.Identifier, ASCII 11->36 dropped 38 C:\Users\user\AppData\Local\...\win32.exe.log, ASCII 11->38 dropped 74 Multi AV Scanner detection for dropped file 11->74 76 Machine Learning detection for dropped file 11->76 19 win32.exe 1 11->19         started        21 win32.exe 13->21         started        signatures5 process6 dnsIp7 46 mrtoby.hopto.org 107.175.242.14, 49319, 49703, 49724 AS-COLOCROSSINGUS United States 15->46 48 Multi AV Scanner detection for dropped file 15->48 50 Machine Learning detection for dropped file 15->50 52 Contains functionality to detect virtual machines (IN, VMware) 15->52 54 Contains functionality to inject code into remote processes 15->54 23 WerFault.exe 23 9 15->23         started        56 Contains functionality to steal Chrome passwords or cookies 19->56 58 Contains functionality to capture and log keystrokes 19->58 60 Contains functionality to steal Firefox passwords or cookies 19->60 26 WerFault.exe 8 19->26         started        signatures8 process9 file10 42 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 23->42 dropped 44 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 26->44 dropped
Threat name:
ByteCode-MSIL.Downloader.Seraph
Status:
Malicious
First seen:
2021-08-26 12:36:18 UTC
AV detection:
12 of 26 (46.15%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:mrtoby persistence rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
Remcos
Malware Config
C2 Extraction:
mrtoby.hopto.org:49319
Unpacked files
SH256 hash:
7b08f9424c44c305283e823a3bf9e40de29d8fb2fce28de3be2e26de2075b3a2
MD5 hash:
76b82467b1ab8e60007a4ebe3afa8c7a
SHA1 hash:
1f157bc98bdb5d5e5b3b97c5024ecaeb6a61f79b
Detections:
win_remcos_g0 win_remcos_auto
SH256 hash:
069082bc975e029a7fac1da0391d878dbccb5181a41eb466a9da0c953915d3b1
MD5 hash:
f9afaafef23130e2417b38e3c38ec6e6
SHA1 hash:
9cd16c02ca6f6541ff124a8d46a538bf87ee2f93
SH256 hash:
dc1fc714024bf27fc8cfbaefdb737fb56a08906c3623a5b59a14c55ce482deaa
MD5 hash:
9488e84508ea50b0e713ceef5dca6de8
SHA1 hash:
1c562d9e118b81ff065937fed0f22420bed21b63
SH256 hash:
0cdbbad2c981d41b9a576a234ecf97cfeb8ed01e869375f3fd3b782310ea1649
MD5 hash:
fadda1f820898325624fceea30e15718
SHA1 hash:
f8f93bb593da20a1e7625bc9dfcdcd4416d88d25
Malware family:
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:buerloader_halo_generated
Author:Halogen Generated Rule, Corsin Camichel
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer
Author:ditekSHen
Description:detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:pe_imphash
Rule name:pe_imphash
Rule name:Remcos
Author:JPCERT/CC Incident Response Group
Description:detect Remcos in memory
Rule name:remcos_rat
Author:jeFF0Falltrades
Rule name:REMCOS_RAT_variants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.remcos.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments