MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 155ca2a0805d91f0677c262aca5016c88459874cab0ec51c1953499479989f7e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 11


Intelligence 11 IOCs YARA 8 File information Comments

SHA256 hash: 155ca2a0805d91f0677c262aca5016c88459874cab0ec51c1953499479989f7e
SHA3-384 hash: 90b840c5e66b6b5e7c3a6e2e65c04d4dff452e8c708669dda8d6e656f0f39e442b9c7c812911efe0226867d6d147dadd
SHA1 hash: 05a33eb328e1c34b545c1fe0b11152bb1dcca37e
MD5 hash: bfd9a208c4e94c0b5b46c35ff6121eb5
humanhash: winter-georgia-jig-nebraska
File name:recover.bat
Download: download sample
Signature RemcosRAT
File size:370 bytes
First seen:2023-04-05 00:40:26 UTC
Last seen:Never
File type:Batch (bat) bat
MIME type:text/x-msdos-batch
ssdeep 6:hyJHCy1xFdeGgdEWRy8DOckqi23fReGgdEWRy44Ak2clHozLh8CmNIy4hdy5RTOL:UJig4ukDOVqZouAC6vGXNIy4ny5tOVqe
Threatray 1'784 similar samples on MalwareBazaar
TLSH T125E0D817412F07B6C567BC4874E34A9FA5270C59725D0FA421F15C1E21426A6B3EDE15
Reporter Chainskilabs
Tags:bat RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
137
Origin country :
US US
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
recover.bat
Verdict:
Malicious activity
Analysis date:
2023-04-05 00:42:14 UTC
Tags:
loader remcos

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
Using the Windows Management Instrumentation requests
Сreating synchronization primitives
Sending an HTTP GET request
Creating a file in the %temp% directory
Running batch commands
Creating a process from a recently created file
Launching cmd.exe command interpreter
Creating a file in the %AppData% subdirectories
Enabling the 'hidden' option for recently created files
Changing a file
Creating a file
Sending a custom TCP request
DNS request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Blocking the User Account Control
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
cmd explorer.exe greyware keylogger powershell shell32.dll
Result
Verdict:
UNKNOWN
Result
Threat name:
Detection:
malicious
Classification:
rans.troj.spyw.expl.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to bypass UAC (CMSTPLUA)
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Disables UAC (registry)
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Powershell drops PE file
Sigma detected: Remcos
Suspicious powershell command line found
Uses cmd line tools excessively to alter registry or file data
Writes to foreign memory regions
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 841408 Sample: recover.bat Startdate: 05/04/2023 Architecture: WINDOWS Score: 100 100 Malicious sample detected (through community Yara rule) 2->100 102 Antivirus detection for URL or domain 2->102 104 Contains functionality to bypass UAC (CMSTPLUA) 2->104 106 8 other signatures 2->106 11 cmd.exe 1 2->11         started        14 Chrome.exe 1 1 2->14         started        16 Chrome.exe 1 1 2->16         started        18 3 other processes 2->18 process3 signatures4 126 Suspicious powershell command line found 11->126 20 powershell.exe 14 21 11->20         started        25 conhost.exe 11->25         started        128 Writes to foreign memory regions 14->128 130 Maps a DLL or memory area into another process 14->130 27 cmd.exe 1 14->27         started        29 iexplore.exe 14->29         started        31 cmd.exe 1 16->31         started        33 iexplore.exe 16->33         started        process5 dnsIp6 82 141.95.16.111, 49698, 8080 DFNVereinzurFoerderungeinesDeutschenForschungsnetzese Germany 20->82 84 192.168.2.1 unknown unknown 20->84 80 C:\Users\user\AppData\Local\...\RiotGames.exe, PE32 20->80 dropped 112 Powershell drops PE file 20->112 35 cmd.exe 1 20->35         started        37 Chrome.exe 1 1 20->37         started        114 Uses cmd line tools excessively to alter registry or file data 27->114 40 conhost.exe 27->40         started        42 reg.exe 1 27->42         started        44 conhost.exe 31->44         started        46 reg.exe 1 31->46         started        file7 signatures8 process9 signatures10 48 RiotGames.exe 2 3 35->48         started        108 Writes to foreign memory regions 37->108 110 Maps a DLL or memory area into another process 37->110 52 cmd.exe 1 37->52         started        54 iexplore.exe 37->54         started        process11 file12 78 C:\Users\user\AppData\Roaming\...\Chrome.exe, PE32 48->78 dropped 86 Antivirus detection for dropped file 48->86 88 Multi AV Scanner detection for dropped file 48->88 90 Contains functionality to bypass UAC (CMSTPLUA) 48->90 94 5 other signatures 48->94 56 Chrome.exe 2 1 48->56         started        59 cmd.exe 1 48->59         started        92 Uses cmd line tools excessively to alter registry or file data 52->92 61 conhost.exe 52->61         started        63 reg.exe 1 52->63         started        signatures13 process14 signatures15 116 Antivirus detection for dropped file 56->116 118 Multi AV Scanner detection for dropped file 56->118 120 Machine Learning detection for dropped file 56->120 124 2 other signatures 56->124 65 cmd.exe 56->65         started        68 iexplore.exe 56->68         started        122 Uses cmd line tools excessively to alter registry or file data 59->122 70 reg.exe 1 59->70         started        72 conhost.exe 59->72         started        process16 signatures17 96 Uses cmd line tools excessively to alter registry or file data 65->96 74 conhost.exe 65->74         started        76 reg.exe 1 65->76         started        98 Disables UAC (registry) 70->98 process18
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:remotehost evasion persistence rat trojan
Behaviour
Modifies registry class
Modifies registry key
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Blocklisted process makes network request
Downloads MZ/PE file
Remcos
UAC bypass
Malware Config
C2 Extraction:
141.95.16.111:2404
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:iexplorer_remcos
Author:iam-py-test
Description:Detect iexplorer being taken over by Remcos
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM
Author:ditekSHen
Description:Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Rule name:Remcos
Author:kevoreilly
Description:Remcos Payload
Rule name:REMCOS_RAT_variants
Rule name:Suspicious_Macro_Presence
Author:Mehmet Ali Kerimoglu (CYB3RMX)
Description:This rule detects common malicious/suspicious implementations.
Rule name:Windows_Trojan_Remcos_b296e965
Author:Elastic Security
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.remcos.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments