MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1900ff6e192b9c247c0ce261b0d99d72bcfd9af9c8a94f2b0e88871a76eb662e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RemoteManipulator
Vendor detections: 10
| SHA256 hash: | 1900ff6e192b9c247c0ce261b0d99d72bcfd9af9c8a94f2b0e88871a76eb662e |
|---|---|
| SHA3-384 hash: | 72f172d2fd1be5dda232cba58b9c86e34b02d8c37d31735b5f89234c1cfe25a7dd49f33749b806d25de31c50e36406ac |
| SHA1 hash: | 1f56085421306ccfdcf26604f43662e1aec9cddc |
| MD5 hash: | c9bfc737cb069c9222294a25160ba101 |
| humanhash: | alanine-lake-coffee-solar |
| File name: | 1900FF6E192B9C247C0CE261B0D99D72BCFD9AF9C8A94.exe |
| Download: | download sample |
| Signature | RemoteManipulator |
| File size: | 4'452'467 bytes |
| First seen: | 2021-11-07 16:41:45 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 4cfda23baf1e2e983ddfeca47a5c755a (33 x RedLineStealer, 6 x Dridex, 5 x NetSupport) |
| ssdeep | 98304:vFY05+wES4mw3G6k34csV9XbB/RM2J809c4CkL8d847D79hmqElOA:F+wVpw3G6kodV7/G2qYFCkLCD6qSOA |
| Threatray | 201 similar samples on MalwareBazaar |
| TLSH | T1392633B2B451D4B4C9464435B9B84BB1E9FBB43019260BC7FFDAEB0C6F605D2A71A702 |
| File icon (PE): | |
| dhash icon | cdabae6fe6e7eaec (20 x Amadey, 9 x AurotunStealer, 8 x CoinMiner) |
| Reporter | |
| Tags: | exe RemoteManipulator |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| 95.213.205.82:5655 | https://threatfox.abuse.ch/ioc/244879/ |
Intelligence
File Origin
# of uploads :
1
# of downloads :
171
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
greyware overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
Result
Threat name:
RMSRemoteAdmin
Detection:
malicious
Classification:
evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes security center settings (notifications, updates, antivirus, firewall)
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Sigma detected: Suspicious Compression Tool Parameters
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses regedit.exe to modify the Windows registry
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2018-06-28 03:40:28 UTC
AV detection:
18 of 27 (66.67%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 191 additional samples on MalwareBazaar
Result
Malware family:
rms
Score:
10/10
Tags:
family:rms aspackv2 rat trojan upx
Behaviour
Delays execution with timeout.exe
Kills process with taskkill
Modifies registry class
Runs .reg file with regedit
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: SetClipboardViewer
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Loads dropped DLL
ASPack v2.12-2.42
Executes dropped EXE
UPX packed file
ACProtect 1.3x - 1.4x DLL software
RMS
Unpacked files
SH256 hash:
4a7ff6b57d77fdc6ee60765c950427e2c2fcf121734a47941ecffde3a53f3c67
MD5 hash:
a43cd869a742f670df9ce345eb6de0cf
SHA1 hash:
3f292a28f9c996eb201560d6adcab4c84c3c5dd0
SH256 hash:
f739c2324026878adbbe89d3e975383c87f5451223590f85ff17c8bf1989841a
MD5 hash:
715a6a93470136846dca5d9915bb0ae9
SHA1 hash:
38b2c4fa5093dba37ce65a03d35a4a9540e0b9ff
SH256 hash:
4dc37311030b8c72b4a981543c2c13d862bc286f3b54761bc67209af9769c7f1
MD5 hash:
302aa99040f8a565504818d439609c78
SHA1 hash:
c250563bb2f6aa364525015e87ce35ffa936d166
SH256 hash:
ce2896d96147764e1beac08ab1a838d839d89fdd3ac6dda44a8d828248518e74
MD5 hash:
fb57d955a1ba2372d2d8b3a8c222e591
SHA1 hash:
cb131a7560a070312cd7a25a5a4060cd46785469
Detections:
win_rms_a0
win_rms_auto
SH256 hash:
1900ff6e192b9c247c0ce261b0d99d72bcfd9af9c8a94f2b0e88871a76eb662e
MD5 hash:
c9bfc737cb069c9222294a25160ba101
SHA1 hash:
1f56085421306ccfdcf26604f43662e1aec9cddc
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.