MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 18a39f6193c69dae7ea38aa9dd25fddabdb651c4276e242d0b585bd13c49c3a9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 15


Intelligence 15 IOCs YARA 2 File information Comments

SHA256 hash: 18a39f6193c69dae7ea38aa9dd25fddabdb651c4276e242d0b585bd13c49c3a9
SHA3-384 hash: 7a9974d7d6c32274cdacd87c43586a1d15c58fb3fa714b4e77732f93cda307bcad794e525ac6cfd7abb07d0166c0fb2c
SHA1 hash: 5928fcd61ffc005ae206d0770ff79b29ff568cf8
MD5 hash: c448b5b11fb80f60bf423a57494f7a36
humanhash: cat-carolina-thirteen-single
File name:SCANimage2021042GFREDS12322ERDQ1DOC03027382DOC202205133.exe
Download: download sample
Signature RemcosRAT
File size:1'158'144 bytes
First seen:2023-01-03 09:53:01 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'600 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 24576:nW81VuuttdGtH1lxLFoUZ9Z9IDE2m8aeeMlx2cHs6Sq:xbttdGtH1bS6X9UE2m8FqcHs
Threatray 8'269 similar samples on MalwareBazaar
TLSH T12C35CF8932F29033F6DB02301735BACC0D727943796AF11A9A677BA59131DFF7A94212
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter Anonymous
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
204
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
SCANimage2021042GFREDS12322ERDQ1DOC03027382DOC202205133.exe
Verdict:
Malicious activity
Analysis date:
2023-01-03 09:54:15 UTC
Tags:
trojan rat remcos

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Launching a process
Creating a process with a hidden window
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed remcos
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Initial sample is a PE file and has a suspicious name
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM3
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 777202 Sample: SCANimage2021042GFREDS12322... Startdate: 03/01/2023 Architecture: WINDOWS Score: 100 51 Snort IDS alert for network traffic 2->51 53 Malicious sample detected (through community Yara rule) 2->53 55 Sigma detected: Scheduled temp file as task from temp location 2->55 57 9 other signatures 2->57 7 SCANimage2021042GFREDS12322ERDQ1DOC03027382DOC202205133.exe 7 2->7         started        11 Kjpmqwxu.exe 5 2->11         started        process3 file4 37 C:\Users\user\AppData\Roaming\Kjpmqwxu.exe, PE32 7->37 dropped 39 C:\Users\...\Kjpmqwxu.exe:Zone.Identifier, ASCII 7->39 dropped 41 C:\Users\user\AppData\Local\...\tmpC1D1.tmp, XML 7->41 dropped 43 SCANimage2021042GF...OC202205133.exe.log, ASCII 7->43 dropped 59 Uses schtasks.exe or at.exe to add and modify task schedules 7->59 61 Adds a directory exclusion to Windows Defender 7->61 13 vbc.exe 2 16 7->13         started        17 powershell.exe 21 7->17         started        19 powershell.exe 21 7->19         started        27 2 other processes 7->27 63 Multi AV Scanner detection for dropped file 11->63 65 Machine Learning detection for dropped file 11->65 21 schtasks.exe 11->21         started        23 vbc.exe 11->23         started        25 vbc.exe 11->25         started        signatures5 process6 dnsIp7 45 www.hemidiindia.com 91.192.100.23, 49698, 5200 AS-SOFTPLUSCH Switzerland 13->45 47 geoplugin.net 178.237.33.50, 49699, 80 ATOM86-ASATOM86NL Netherlands 13->47 49 192.168.2.1 unknown unknown 13->49 67 Installs a global keyboard hook 13->67 29 conhost.exe 17->29         started        31 conhost.exe 19->31         started        33 conhost.exe 21->33         started        35 conhost.exe 27->35         started        signatures8 process9
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-12-19 16:21:50 UTC
File Type:
PE (.Net Exe)
Extracted files:
10
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:rozena-hamid-india rat
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Uses the VBS compiler for execution
Remcos
Malware Config
C2 Extraction:
www.hemidiindia.com:5200
Unpacked files
SH256 hash:
ec2dab9f70b5749a4abed42f4b8c513fa8e4ce2d98e8fa1503b867c21e639926
MD5 hash:
ac6a211bc43eb58eae438da74acb5cf4
SHA1 hash:
fcccb0ddb56b644746e730ca8e62584b8edf212a
Detections:
Remcos win_remcos_auto
SH256 hash:
d7316381a54d1cac5b9efe2334597983f5f22a97208196bbeb2927c7614181dc
MD5 hash:
04d4e9b0466aa55f44e418c0c90fd9e8
SHA1 hash:
cbb1654399275a6a3be8d0e61460b67c6cd57f8c
SH256 hash:
22a99e2740dcb5fcab542cb6ee33472a01b8f226f76e031e31b9f00ca1b08b8c
MD5 hash:
bb7995fc982c684be3ddc978e7853bca
SHA1 hash:
b5b9064f2f4ca6b8fa9646700d0bb7d0e0acbd55
SH256 hash:
711d36a8cf79b7fec103c61ccdfa6da129206f38a7a692501fb50fed86f4caf9
MD5 hash:
d16dd3856632a1e660a5685cf3f2e962
SHA1 hash:
559e75cc7d5755349aad5cbe735080ec58cc989b
SH256 hash:
1e1d95263e73e5f8bc1e34038191d1751dce40e736778a78d47a9c78e0d756bf
MD5 hash:
84570fadeae91b6f448afd79637b72db
SHA1 hash:
33adbbd2d837141d184147846a8f1050752c384e
SH256 hash:
18a39f6193c69dae7ea38aa9dd25fddabdb651c4276e242d0b585bd13c49c3a9
MD5 hash:
c448b5b11fb80f60bf423a57494f7a36
SHA1 hash:
5928fcd61ffc005ae206d0770ff79b29ff568cf8
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

Executable exe 18a39f6193c69dae7ea38aa9dd25fddabdb651c4276e242d0b585bd13c49c3a9

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments