MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 17f2294d91ce7c045b171bc51d36836f68063ca362bd2a9dd2c6108eaeb4c9c7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 17f2294d91ce7c045b171bc51d36836f68063ca362bd2a9dd2c6108eaeb4c9c7
SHA3-384 hash: c4e66b1342ccff7dade5f9e9d88a8077ee50ee7b07f4b41a0483fdd6ace5e00a91ec4ea81a409a6747b86ddee9f4eda6
SHA1 hash: e4a7a5fa43cbfa1761ffa7710796076371f6dbd4
MD5 hash: eb3df10beda8448e70466d6986f90d0a
humanhash: oranges-golf-network-north
File name:Bank Receipt 23.10.rar
Download: download sample
Signature RemcosRAT
File size:460'539 bytes
First seen:2020-10-23 09:29:35 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 12288:+BSSyLTiUHix22BcYLEe1coaWM5xzMVVW+7tY:MSdLTCYGcUMoLHRY
TLSH 09A423C4EC41E170D9DCCFCB26126FC958A8B045ED4D9B689F1197C2F9BD96B02E7888
Reporter abuse_ch
Tags:rar RemcosRAT


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: poydorus.t.mk
Sending IP: 195.26.152.36
From: Filip Petrovski <f.petrovski@bulmak2016.com.mk>
Subject: Notification of transaction completed ZYOI20
Attachment: Bank Receipt 23.10.rar (contains "Bank Receipt 23.10.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
88
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.NetWired
Status:
Malicious
First seen:
2020-10-23 08:21:32 UTC
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

rar 17f2294d91ce7c045b171bc51d36836f68063ca362bd2a9dd2c6108eaeb4c9c7

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments