MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1587d0df87cff791bee9142151cd753acdc57571af58b7ce16a616afb92bac94. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RemcosRAT
Vendor detections: 18
| SHA256 hash: | 1587d0df87cff791bee9142151cd753acdc57571af58b7ce16a616afb92bac94 |
|---|---|
| SHA3-384 hash: | 18eefde15eae2f9a76a095aae6145db2687b6bd772762a4bf762653595dcb1895f68db5e89705e98fa4e9305fa0a0faf |
| SHA1 hash: | 0aa0f9651c32da7a13c3ba8c936d1aa539c179be |
| MD5 hash: | bc037e0bfd04424644ab83f335b50d77 |
| humanhash: | princess-pluto-mango-oklahoma |
| File name: | ungziped_file |
| Download: | download sample |
| Signature | RemcosRAT |
| File size: | 940'552 bytes |
| First seen: | 2025-03-17 12:02:05 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 24576:Gu4zFRSfVcnx+tnF51AV26rrZsx+EM/9Jzbda04J6k7dg:Gu4zF0Rn1AVZTbdLS6l |
| TLSH | T1841523A49679DF53DAB417F00A72D23047B6BF1DF820E24A8EF69CCB3021B642619757 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10522/11/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| Reporter | |
| Tags: | exe RemcosRAT |
Intelligence
File Origin
HUVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
6654e909452d713f3f51aa800e0633bbc63e859bb3f63f5c833273e516f1c3d3
cf6365bfb6ff4604e981baa9fab6a5f57c141e58a50401d8c273ab02844b7dbd
6436df943cf575aaa1f311c20b10650f6ebba35add1a45c1b736fe713949ac21
ea1a35ea870465623c9478c6a1afb90cdca0579189a45eda755afbe2cd9d022f
41415c1dab37487faf427095855fb66cafa150ae15b9c515234e1e0b5f733aa8
06c800d5feba73344681fe9f7fa2cf6606d18fc37cc0a84cbcce2e06fa6dd9f9
b6ae18a5eade4cdd5181289b7786f7c579f10161aba8753ac3e0042d1afff2d8
1587d0df87cff791bee9142151cd753acdc57571af58b7ce16a616afb92bac94
f6e4833668ca8d61f06a531d2dbaa1ec38f0905c7a3d4523c1cb142df066d74e
0bc4589749f91661e58192bb1200809244d27248e8ee1935baeaaaefd60aa7f6
1587d0df87cff791bee9142151cd753acdc57571af58b7ce16a616afb92bac94
1b9ffe88ec292067ef1eafeffa284d8fb12a02b0d52f38fbe6834ab7a5c05009
48075512d81806049d193cf798c12f30110cb03ccd0f18bc69e9aa1af69693f8
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AgentTesla_DIFF_Common_Strings_01 |
|---|---|
| Author: | schmidtsz |
| Description: | Identify partial Agent Tesla strings |
| Rule name: | INDICATOR_KB_CERT_7c1118cbbadc95da3752c46e47a27438 |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables signed with stolen, revoked or invalid certificates |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | PE_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.