MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0f111ae9913e0c6f2978f0af21c027db5be557acde02e240d5a4b3ce9be9fdbd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 14


Intelligence 14 IOCs YARA 2 File information Comments

SHA256 hash: 0f111ae9913e0c6f2978f0af21c027db5be557acde02e240d5a4b3ce9be9fdbd
SHA3-384 hash: 268eed277fcc557844908bffe7ad5a6cbcc0586a6cff2263cffe411b638cf0f700d09d787123d8ada481397bcb7f950b
SHA1 hash: 7b663c8c686563d21e4b7a3611dfcb6bbf3b8c81
MD5 hash: 39f9485d7ba472899ebbe476124a6a40
humanhash: carolina-beer-eight-emma
File name:file
Download: download sample
Signature RemcosRAT
File size:1'042'432 bytes
First seen:2023-03-14 15:56:14 UTC
Last seen:2023-03-14 17:28:38 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'660 x AgentTesla, 19'469 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 24576:7zl6TiF+oLq2cv+91AW2apHludYC1BJ957tZURrF8us2lo2v18:7MWFdLcverPadYWBJ77tZ6FXTlo2v18
TLSH T18B25235A33C4A797C6BC97F568542080637DE7BB19E6E09C0CC4B4C89B21B624963F6B
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon 0000000000000000 (872 x AgentTesla, 496 x Formbook, 296 x RedLineStealer)
Reporter jstrosch
Tags:.NET exe MSIL RemcosRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
257
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
current statement 1737-070223.xlsx
Verdict:
Malicious activity
Analysis date:
2023-03-14 07:39:53 UTC
Tags:
exploit cve-2017-11882 loader remcos

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Launching a process
Creating a process with a hidden window
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
comodo formbook packed remcos
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Delayed program exit found
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 826391 Sample: file.exe Startdate: 14/03/2023 Architecture: WINDOWS Score: 100 58 Malicious sample detected (through community Yara rule) 2->58 60 Antivirus detection for URL or domain 2->60 62 Antivirus detection for dropped file 2->62 64 5 other signatures 2->64 10 file.exe 3 2->10         started        14 qos.exe 2->14         started        16 qos.exe 2 2->16         started        18 qos.exe 2 2->18         started        process3 file4 50 C:\Users\user\AppData\Local\...\file.exe.log, ASCII 10->50 dropped 74 Contains functionality to steal Chrome passwords or cookies 10->74 76 Contains functionality to steal Firefox passwords or cookies 10->76 78 Delayed program exit found 10->78 20 file.exe 5 4 10->20         started        23 qos.exe 14->23         started        25 qos.exe 14->25         started        27 qos.exe 16->27         started        29 qos.exe 18->29         started        signatures5 process6 file7 44 C:\Users\user\AppData\Roaming\qos.exe, PE32 20->44 dropped 46 C:\Users\user\...\qos.exe:Zone.Identifier, ASCII 20->46 dropped 48 C:\Users\user\...\loxabivnbrhtsejnehzplks.vbs, data 20->48 dropped 31 wscript.exe 1 20->31         started        process8 process9 33 cmd.exe 1 31->33         started        process10 35 qos.exe 3 33->35         started        38 conhost.exe 33->38         started        signatures11 66 Multi AV Scanner detection for dropped file 35->66 68 Machine Learning detection for dropped file 35->68 70 Injects a PE file into a foreign processes 35->70 40 qos.exe 2 14 35->40         started        process12 dnsIp13 52 gdyhjjdhbvxgsfe.gotdns.ch 37.139.129.71, 2718, 49696 LVLT-10753US Germany 40->52 54 geoplugin.net 178.237.33.50, 49697, 80 ATOM86-ASATOM86NL Netherlands 40->54 56 192.168.2.1 unknown unknown 40->56 72 Installs a global keyboard hook 40->72 signatures14
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2023-03-14 07:28:41 UTC
File Type:
PE (.Net Exe)
Extracted files:
20
AV detection:
11 of 24 (45.83%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:awele-host persistence rat
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Remcos
Malware Config
C2 Extraction:
gdyhjjdhbvxgsfe.gotdns.ch:2718
Unpacked files
SH256 hash:
b7687f15f15825bd982efcf3f72af2f95415fab2882a8518951684b93215db39
MD5 hash:
783891d7ec4e17998eaef4e9436807da
SHA1 hash:
e2d797fdd66d083ecb03c4883d01673696253b42
SH256 hash:
e779c5bc41404d091ba993ad4055fe0dac24e62fb3223570f6f7d706f06f14da
MD5 hash:
1ff4e9967b4dff394af446516e7f8904
SHA1 hash:
02fc6ac94f0aca5ae7ca04b2583b02805dfef4a5
SH256 hash:
0ff7f10b7ae95af62b92b93b7ba95faf086dde878d16c3607e851f8831c8a5e6
MD5 hash:
94d7142c25ea986bd617711f7e3aa60e
SHA1 hash:
5a9c17bfb4c3980ebbabc2012c4c5378087a9d1a
SH256 hash:
0f111ae9913e0c6f2978f0af21c027db5be557acde02e240d5a4b3ce9be9fdbd
MD5 hash:
39f9485d7ba472899ebbe476124a6a40
SHA1 hash:
7b663c8c686563d21e4b7a3611dfcb6bbf3b8c81
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

Executable exe 0f111ae9913e0c6f2978f0af21c027db5be557acde02e240d5a4b3ce9be9fdbd

(this sample)

  
Delivery method
Distributed via web download

Comments