MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 15170d0dbe467efc4e38156ed4e03702ae19af44c100d7df7a75c6dbdb7ac587. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 10


Intelligence 10 IOCs YARA 7 File information Comments

SHA256 hash: 15170d0dbe467efc4e38156ed4e03702ae19af44c100d7df7a75c6dbdb7ac587
SHA3-384 hash: f3a2a0bb23a98d3bec0cdde9b178c0214a8227bc2245722292bc9fcd4da2a96d71e0215f6c36a7980a426b2484fbec9e
SHA1 hash: e724267c4405c6e0bba356c4193662017ed29d16
MD5 hash: 09ae134443ee2e63240664c93e2c6afd
humanhash: leopard-aspen-muppet-washington
File name:goodluckvpn.exe
Download: download sample
Signature RemcosRAT
File size:397'312 bytes
First seen:2020-10-12 12:15:00 UTC
Last seen:2020-10-12 12:41:20 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash c458ff2d515beb8f44158cd3636a7400 (19 x AgentTesla, 6 x NetWire, 3 x HawkEye)
ssdeep 12288:E37X7IQm0jgt9LB2bEseg/IiGPMhYBgiSh:ELX740jgHB2Z37GPMhYBgiS
Threatray 807 similar samples on MalwareBazaar
TLSH A3842379C129A975C3A52FB0234BCE3622855CAB4CB6C5218E91DEDFB434BF4C306667
Reporter vxsh4d0w
Tags:AgentTesla RemcosRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
107
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the Program Files subdirectories
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a process with a hidden window
Sending a UDP request
Deleting a recently created file
Running batch commands
Launching a process
Launching the default Windows debugger (dwwin.exe)
Creating a file in the %AppData% subdirectories
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process by context flags manipulation
Setting a global event handler for the keyboard
Connection attempt to an infection source
Forced shutdown of a system process
Enabling autorun
Unauthorized injection to a system process
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Contains functionality to capture and log keystrokes
Contains functionality to detect sleep reduction / modifications
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Creates an undocumented autostart registry key
Detected Remcos RAT
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Sigma detected: Suspicious Svchost Process
Writes to foreign memory regions
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 296632 Sample: goodluckvpn.exe Startdate: 12/10/2020 Architecture: WINDOWS Score: 100 63 Malicious sample detected (through community Yara rule) 2->63 65 Multi AV Scanner detection for dropped file 2->65 67 Multi AV Scanner detection for submitted file 2->67 69 10 other signatures 2->69 13 goodluckvpn.exe 2->13         started        16 slaves.exe 2->16         started        18 slaves.exe 2->18         started        20 slaves.exe 2->20         started        process3 signatures4 81 Contains functionality to steal Chrome passwords or cookies 13->81 83 Contains functionality to capture and log keystrokes 13->83 85 Contains functionality to inject code into remote processes 13->85 89 2 other signatures 13->89 22 goodluckvpn.exe 6 5 13->22         started        87 Maps a DLL or memory area into another process 16->87 26 slaves.exe 16->26         started        28 slaves.exe 18->28         started        30 slaves.exe 20->30         started        process5 file6 55 C:\Program Files (x86)\slaves\slaves.exe, PE32 22->55 dropped 57 C:\...\slaves.exe:Zone.Identifier, ASCII 22->57 dropped 73 Creates an undocumented autostart registry key 22->73 32 wscript.exe 1 22->32         started        signatures7 process8 process9 34 cmd.exe 1 32->34         started        process10 36 slaves.exe 34->36         started        39 conhost.exe 34->39         started        signatures11 71 Maps a DLL or memory area into another process 36->71 41 slaves.exe 4 5 36->41         started        process12 dnsIp13 61 79.134.225.72, 49742, 49743, 49744 FINK-TELECOM-SERVICESCH Switzerland 41->61 59 C:\Users\user\AppData\Roaming\...\logs.dat, ASCII 41->59 dropped 75 Writes to foreign memory regions 41->75 77 Allocates memory in foreign processes 41->77 79 Injects a PE file into a foreign processes 41->79 46 svchost.exe 41->46         started        file14 signatures15 process16 signatures17 91 Maps a DLL or memory area into another process 46->91 49 svchost.exe 46->49         started        51 svchost.exe 46->51         started        process18 process19 53 WerFault.exe 23 9 49->53         started       
Threat name:
Win32.Trojan.LokibotCrypt
Status:
Malicious
First seen:
2020-10-12 12:16:07 UTC
AV detection:
27 of 29 (93.10%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
upx rat family:remcos persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Modifies registry class
Drops file in Program Files directory
Suspicious use of SetThreadContext
Adds Run key to start application
UPX packed file
Adds policy Run key to start application
Executes dropped EXE
Remcos
Unpacked files
SH256 hash:
15170d0dbe467efc4e38156ed4e03702ae19af44c100d7df7a75c6dbdb7ac587
MD5 hash:
09ae134443ee2e63240664c93e2c6afd
SHA1 hash:
e724267c4405c6e0bba356c4193662017ed29d16
SH256 hash:
16b95144592672282972680b6e4c7b08f075c616fb326ea68243d959077d322a
MD5 hash:
b5c7bd4f66c198d986803f017e128e63
SHA1 hash:
ab7c7dd211c2bca56a313c0dd8ac72995b324e13
SH256 hash:
4d755262fd2c7f0539f919d300c7ebc3bd70267c002bcb8edd886a40e3f8ba75
MD5 hash:
add0384f8f503d06ffa976cbcb389582
SHA1 hash:
93c7c2255bb9725c8ad6a9e992c2feaf8c80fe7b
SH256 hash:
dcba8744b929817fb6cd779a6bdd4a655bda6e610b5345da5d5b946f0cbce084
MD5 hash:
177d66e3a56bfde32da55007055956d8
SHA1 hash:
4b5e67eee17897871f10569ae8bb7e4251f01452
SH256 hash:
9ece7f07dfd6a2373c01441bd0f2d666b0699c62f1b5506a7dd8a44bb6ca8b6c
MD5 hash:
0d4cfda8f43b7cca30dbfcee13dd3bde
SHA1 hash:
7e57a14d6787f935d0210392ffab7cfa8882aadd
SH256 hash:
4ef22b7579d8052106eeaf5b699bef003d91d41888ff189a191da9ab6ba0d6db
MD5 hash:
012e8f77530b7c50d446d4c024f70247
SHA1 hash:
73a2e9d47928f7564614bb4c697777a3c947223f
Detections:
win_remcos_g0 win_remcos_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_RemcosRAT
Author:abuse.ch
Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:Parallax
Author:@bartblaze
Description:Identifies Parallax RAT.
Rule name:Remcos
Author:JPCERT/CC Incident Response Group
Description:detect Remcos in memory
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

Executable exe 15170d0dbe467efc4e38156ed4e03702ae19af44c100d7df7a75c6dbdb7ac587

(this sample)

Comments