MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 17179c73942c7bd427ea534efb1452991c037616294402e1ae231627f55eca21. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 10


Intelligence 10 IOCs YARA 3 File information Comments

SHA256 hash: 17179c73942c7bd427ea534efb1452991c037616294402e1ae231627f55eca21
SHA3-384 hash: 6bd22fe19b35cb2ca0466e0018c88ed44e643d6f031feb5fb01b9e676e63fca9f8ced7c6e3f0aac0b843228dee5d6c83
SHA1 hash: c98727d5bf4a06d8549bb2d66fb66da2114526b1
MD5 hash: 119f02d5c975e5a6f607808e2760cce4
humanhash: wisconsin-white-washington-yankee
File name:360055.hta
Download: download sample
Signature RemcosRAT
File size:1'281 bytes
First seen:2025-08-22 16:57:41 UTC
Last seen:Never
File type:HTML Application (hta) hta
MIME type:text/html
ssdeep 24:RMNmMvC4/ptE55f3I2hhjauDxj6IjIdfNzuZFMlbs86tKb:4mM5pO562hFa49VjITuZ+hf6O
TLSH T17D218728D09DD38C9AF2CA5752F7E069DF534147268096047380126FCF7122AD66779D
Magika vba
Reporter abuse_ch
Tags:hta RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
50
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
90.2%
Tags:
xtreme overt blic
Result
Verdict:
Malicious
File Type:
HTA File - Malicious
Payload URLs
URL
File name
https://www.oecd.org/content/dam/oecd/en/publications/reports/2024/07/corporate-tax-statistics-2024_ce7e5701/9c27d6e8-en.pdf','C:\Users\Public\PP1.pdf'
HTA File
Behaviour
BlacklistAPI detected
Result
Threat name:
Detection:
malicious
Classification:
rans.troj.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Contains functionalty to change the wallpaper
Detected Remcos RAT
Drops PE files to the user root directory
Found malware configuration
Loading BitLocker PowerShell Module
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Powershell drops PE file
Sigma detected: Execution from Suspicious Folder
Sigma detected: Execution of Powershell Script in Public Folder
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Program Location with Network Connections
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to download and execute files (via powershell)
Yara detected Powershell download and execute
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1763147 Sample: 360055.hta Startdate: 22/08/2025 Architecture: WINDOWS Score: 100 42 ustaxes.net 2->42 44 x1.i.lencr.org 2->44 46 4 other IPs or domains 2->46 58 Found malware configuration 2->58 60 Multi AV Scanner detection for submitted file 2->60 62 Yara detected Powershell download and execute 2->62 64 9 other signatures 2->64 10 mshta.exe 13 2->10         started        signatures3 process4 signatures5 74 Suspicious powershell command line found 10->74 76 Tries to download and execute files (via powershell) 10->76 78 Bypasses PowerShell execution policy 10->78 13 powershell.exe 18 25 10->13         started        18 powershell.exe 10->18         started        process6 dnsIp7 50 ustaxes.net 65.21.85.206, 443, 49690 CP-ASDE United States 13->50 52 www.oecd.org.cdn.cloudflare.net 104.18.0.146, 443, 49689 CLOUDFLARENETUS United States 13->52 38 C:\Users\Public\syswsl.exE, PE32 13->38 dropped 40 C:\Users\Public\PP1.pdf, PDF 13->40 dropped 84 Drops PE files to the user root directory 13->84 86 Loading BitLocker PowerShell Module 13->86 88 Powershell drops PE file 13->88 20 syswsl.exE 13->20         started        23 Acrobat.exe 20 63 13->23         started        25 conhost.exe 13->25         started        27 conhost.exe 18->27         started        file8 signatures9 process10 signatures11 66 Antivirus detection for dropped file 20->66 68 Multi AV Scanner detection for dropped file 20->68 70 Tries to detect sandboxes and other dynamic analysis tools (window names) 20->70 72 Contains functionalty to change the wallpaper 20->72 29 syswsl.exE 20->29         started        33 AcroCEF.exe 88 23->33         started        process12 dnsIp13 54 88.198.24.82, 2404 HETZNER-ASDE Germany 29->54 80 Detected Remcos RAT 29->80 82 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 29->82 56 e8652.dscx.akamaiedge.net 23.48.144.248, 49695, 80 AKAMAI-ASN1EU United States 33->56 35 AcroCEF.exe 33->35         started        signatures14 process15 dnsIp16 48 23.203.104.175, 443, 49698 AKAMAI-ASUS United States 35->48
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Html PowerShell
Threat name:
Script-WScript.Backdoor.Remcos
Status:
Malicious
First seen:
2025-08-22 16:47:18 UTC
File Type:
Text (HTML)
Extracted files:
1
AV detection:
9 of 38 (23.68%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:banload family:remcos botnet:remotehost adware defense_evasion discovery downloader dropper execution rat spyware trojan
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Windows directory
Checks BIOS information in registry
Checks computer location settings
Executes dropped EXE
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
Downloads MZ/PE file
Modifies trusted root certificate store through registry
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Banload
Banload family
Remcos
Remcos family
Malware Config
C2 Extraction:
88.198.24.82:2404
Dropper Extraction:
https://www.oecd.org/content/dam/oecd/en/publications/reports/2024/07/corporate-tax-statistics-2024_ce7e5701/9c27d6e8-en.pdf
https://ustaxes.net/syswsl.xsx
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

HTML Application (hta) hta 17179c73942c7bd427ea534efb1452991c037616294402e1ae231627f55eca21

(this sample)

  
Delivery method
Distributed via web download

Comments