MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 18f8c880b862e8ee63d989445d174cd01a66921845ebf094035e677246bd84c8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 12


Intelligence 12 IOCs YARA 9 File information Comments

SHA256 hash: 18f8c880b862e8ee63d989445d174cd01a66921845ebf094035e677246bd84c8
SHA3-384 hash: ef2e05b02fa9a7c210ebe2ef69c61e365d7ecaaa8562348f31d68183cc63a4310029d0df9d48a4d912603891119d71ed
SHA1 hash: f46e35ae6b06c47fb6898bf1fdafb256a6f2fe11
MD5 hash: aa814291616a85e37409b0b3292944e0
humanhash: lactose-october-eighteen-zulu
File name:New Order.exe
Download: download sample
Signature RemcosRAT
File size:1'355'776 bytes
First seen:2020-12-22 07:04:35 UTC
Last seen:2020-12-24 08:35:37 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'608 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 24576:42YpVBuixVn2vyQHoPqr89ooPlL6zwtG2dn26G:gnh2vTAWQlNtVnN
Threatray 1'282 similar samples on MalwareBazaar
TLSH 9855CF3439EA9619F0776F764AD4749697FEFA333702D85E38A1038E0623E41DD9123A
Reporter GovCERT_CH
Tags:RemcosRAT

Intelligence


File Origin
# of uploads :
6
# of downloads :
311
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
New Order.exe
Verdict:
Malicious activity
Analysis date:
2020-12-22 07:07:54 UTC
Tags:
rat remcos keylogger

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Launching a process
Creating a file
Setting a global event handler for the keyboard
Connection attempt to an infection source
Unauthorized injection to a system process
Result
Gathering data
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Detected Remcos RAT
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample uses process hollowing technique
Sigma detected: Remcos
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected AntiVM_3
Yara detected Remcos RAT
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-12-21 12:42:00 UTC
AV detection:
22 of 28 (78.57%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos rat
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Drops file in Windows directory
Suspicious use of SetThreadContext
Uses the VBS compiler for execution
Remcos
Malware Config
C2 Extraction:
194.5.98.32:959
Unpacked files
SH256 hash:
18f8c880b862e8ee63d989445d174cd01a66921845ebf094035e677246bd84c8
MD5 hash:
aa814291616a85e37409b0b3292944e0
SHA1 hash:
f46e35ae6b06c47fb6898bf1fdafb256a6f2fe11
SH256 hash:
ab23c94e4e5bf7eeee58690979d7b1a874ff211b58dd16ca19bfa234e48ce277
MD5 hash:
bf774120562e879d1e5e460cb384ab70
SHA1 hash:
365dffff4c21e78daacf8a685fc754c0bdd2b48f
SH256 hash:
55abf08a6a6ab7c7848a2bc0410d84befe6dcfa118336e2e4f1ee456a8009efc
MD5 hash:
6ce9761c3c3ae715d40a77b982d31dc9
SHA1 hash:
42a5a02eabe7d80d79408549e7686d4e44524361
SH256 hash:
7cfff7b0dee56468b95703e1ce388f57836f63570eb247db12dce53cd255fa81
MD5 hash:
cb1b040658dd8ce510b62a77851d28e6
SHA1 hash:
5751d096225ac17fb6a5c4f9f7f82d93ea3d8dfe
SH256 hash:
f7b7d650cf981ae877fbb5078fc0d8756086f9859d589d6ddfbd6689be3d5dd7
MD5 hash:
9edf664d88807c2e241623ad11b48731
SHA1 hash:
dc4924d56cc40bcc4ddf52f544528471feb626c1
Detections:
win_remcos_g0 win_remcos_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_RemcosRAT
Author:abuse.ch
Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer
Author:ditekSHen
Description:detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:Parallax
Author:@bartblaze
Description:Identifies Parallax RAT.
Rule name:Remcos
Author:JPCERT/CC Incident Response Group
Description:detect Remcos in memory
Rule name:remcos_rat
Author:jeFF0Falltrades
Rule name:REMCOS_RAT_variants
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

Executable exe 18f8c880b862e8ee63d989445d174cd01a66921845ebf094035e677246bd84c8

(this sample)

  
Dropped by
RemcosRAT
  
Delivery method
Distributed via e-mail attachment

Comments