MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 17134855fb6c5c7d5357c6a3b87a3bff86c43501e3d6cdfc963204559b1e8d21. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 15


Intelligence 15 IOCs YARA 3 File information Comments

SHA256 hash: 17134855fb6c5c7d5357c6a3b87a3bff86c43501e3d6cdfc963204559b1e8d21
SHA3-384 hash: 5980f03e62ea287194d7e6718efeac45ebffc31ed2e2474c521c78c1d46e5b5ee2b9e5ef682c97704e374a45e905a059
SHA1 hash: 76bfcd75eb207903bc01937892f86abe41e6a2e9
MD5 hash: fa1e01a7b0e427c055eeeed76d4dfc16
humanhash: pip-island-king-tennis
File name:17134855fb6c5c7d5357c6a3b87a3bff86c43501e3d6cdfc963204559b1e8d21
Download: download sample
Signature RemcosRAT
File size:1'331'712 bytes
First seen:2026-03-06 14:46:15 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'861 x AgentTesla, 19'793 x Formbook, 12'305 x SnakeKeylogger)
ssdeep 24576:5SDGxm5ElNTuyRyYTdhfcyLF/s5WYt+RbAj/AJusucy1xqN9CaguQlVict:5SDGxXlNT95NcyLS5WdAj/A+fosuWQc
TLSH T13455121162AFDD22C6A9177350E2E63403B09E5AE013D72B1DEE2FE7BA567D61D84303
TrID 72.4% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
6.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.4% (.EXE) Win64 Executable (generic) (6522/11/2)
4.4% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.EXE) Win16/32 Executable Delphi generic (2072/23)
Magika pebin
Reporter adrian__luca
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
66
Origin country :
HU HU
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
17134855fb6c5c7d5357c6a3b87a3bff86c43501e3d6cdfc963204559b1e8d21
Verdict:
Malicious activity
Analysis date:
2026-03-06 15:08:59 UTC
Tags:
remcos rat auto-startup susp-lnk

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
94.9%
Tags:
injection autorun virus spawn
Verdict:
Malicious
Labled as:
PasswordStealer.Genie8DN.Generic
Verdict:
Malicious
File Type:
exe x32
First seen:
2026-02-12T23:54:00Z UTC
Last seen:
2026-02-13T10:39:00Z UTC
Hits:
~100
Gathering data
Threat name:
Win32.Infostealer.Genie8DN
Status:
Malicious
First seen:
2026-02-13 05:48:47 UTC
File Type:
PE (.Net Exe)
Extracted files:
8
AV detection:
22 of 36 (61.11%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos discovery rat
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Time Discovery
Drops file in Program Files directory
Drops file in Windows directory
SmartAssembly .NET packer
Suspicious use of SetThreadContext
Drops startup file
Remcos
Remcos family
Malware Config
C2 Extraction:
37.120.155.34:2469
Unpacked files
SH256 hash:
17134855fb6c5c7d5357c6a3b87a3bff86c43501e3d6cdfc963204559b1e8d21
MD5 hash:
fa1e01a7b0e427c055eeeed76d4dfc16
SHA1 hash:
76bfcd75eb207903bc01937892f86abe41e6a2e9
SH256 hash:
48fa91de316a3b8b9b173548ff297a529e8045cfba133655cb8d7bf2517df628
MD5 hash:
54f2d8dcde429e9fa2c0cef39b6bb0e7
SHA1 hash:
1b0181a02d9f36613fdd5170d1b84a5a8358b2af
SH256 hash:
bf8060d113b307a84083c2f858c089db95eac3e64ca5baee827fbe1855e2e7da
MD5 hash:
78885ac237cdc8aae6bd6d1d5711c9ae
SHA1 hash:
65532ceeb9f94021e7f622f9c20194121b6d7637
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments