MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1900ff6e192b9c247c0ce261b0d99d72bcfd9af9c8a94f2b0e88871a76eb662e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemoteManipulator


Vendor detections: 10


Intelligence 10 IOCs 1 YARA File information Comments

SHA256 hash: 1900ff6e192b9c247c0ce261b0d99d72bcfd9af9c8a94f2b0e88871a76eb662e
SHA3-384 hash: 72f172d2fd1be5dda232cba58b9c86e34b02d8c37d31735b5f89234c1cfe25a7dd49f33749b806d25de31c50e36406ac
SHA1 hash: 1f56085421306ccfdcf26604f43662e1aec9cddc
MD5 hash: c9bfc737cb069c9222294a25160ba101
humanhash: alanine-lake-coffee-solar
File name:1900FF6E192B9C247C0CE261B0D99D72BCFD9AF9C8A94.exe
Download: download sample
Signature RemoteManipulator
File size:4'452'467 bytes
First seen:2021-11-07 16:41:45 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 4cfda23baf1e2e983ddfeca47a5c755a (33 x RedLineStealer, 6 x Dridex, 5 x NetSupport)
ssdeep 98304:vFY05+wES4mw3G6k34csV9XbB/RM2J809c4CkL8d847D79hmqElOA:F+wVpw3G6kodV7/G2qYFCkLCD6qSOA
Threatray 201 similar samples on MalwareBazaar
TLSH T1392633B2B451D4B4C9464435B9B84BB1E9FBB43019260BC7FFDAEB0C6F605D2A71A702
File icon (PE):PE icon
dhash icon cdabae6fe6e7eaec (20 x Amadey, 9 x AurotunStealer, 8 x CoinMiner)
Reporter abuse_ch
Tags:exe RemoteManipulator


Avatar
abuse_ch
RemoteManipulator C2:
95.213.205.82:5655

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
95.213.205.82:5655 https://threatfox.abuse.ch/ioc/244879/

Intelligence


File Origin
# of uploads :
1
# of downloads :
171
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
greyware overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RMSRemoteAdmin
Detection:
malicious
Classification:
evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes security center settings (notifications, updates, antivirus, firewall)
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Sigma detected: Suspicious Compression Tool Parameters
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses regedit.exe to modify the Windows registry
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 517288 Sample: 1900FF6E192B9C247C0CE261B0D... Startdate: 07/11/2021 Architecture: WINDOWS Score: 100 71 Antivirus detection for dropped file 2->71 73 Antivirus / Scanner detection for submitted sample 2->73 75 Multi AV Scanner detection for dropped file 2->75 77 5 other signatures 2->77 11 1900FF6E192B9C247C0CE261B0D99D72BCFD9AF9C8A94.exe 3 7 2->11         started        14 svchost.exe 2->14         started        17 svchost.exe 2->17         started        20 7 other processes 2->20 process3 dnsIp4 53 C:\log\Rar.exe, PE32 11->53 dropped 55 C:\log\pause.bat, DOS 11->55 dropped 22 wscript.exe 1 11->22         started        81 Changes security center settings (notifications, updates, antivirus, firewall) 14->81 24 MpCmdRun.exe 14->24         started        67 192.168.2.1 unknown unknown 17->67 file5 signatures6 process7 process8 26 cmd.exe 1 22->26         started        29 conhost.exe 24->29         started        signatures9 79 Uses regedit.exe to modify the Windows registry 26->79 31 nvidia.exe 12 26->31         started        35 Rar.exe 5 26->35         started        37 taskkill.exe 1 26->37         started        39 6 other processes 26->39 process10 file11 57 C:\Program Files\java\rutserv.exe, PE32 31->57 dropped 59 C:\Program Files\java\rfusclient.exe, PE32 31->59 dropped 61 C:\Program Files\java\vp8encoder.dll, PE32 31->61 dropped 63 C:\Program Files\java\vp8decoder.dll, PE32 31->63 dropped 69 Multi AV Scanner detection for dropped file 31->69 41 wscript.exe 1 31->41         started        65 C:\log\nvidia.exe, PE32 35->65 dropped signatures12 process13 process14 43 cmd.exe 41->43         started        process15 45 conhost.exe 43->45         started        47 taskkill.exe 43->47         started        49 taskkill.exe 43->49         started        51 6 other processes 43->51
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2018-06-28 03:40:28 UTC
AV detection:
18 of 27 (66.67%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:rms aspackv2 rat trojan upx
Behaviour
Delays execution with timeout.exe
Kills process with taskkill
Modifies registry class
Runs .reg file with regedit
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: SetClipboardViewer
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Loads dropped DLL
ASPack v2.12-2.42
Executes dropped EXE
UPX packed file
ACProtect 1.3x - 1.4x DLL software
RMS
Unpacked files
SH256 hash:
4a7ff6b57d77fdc6ee60765c950427e2c2fcf121734a47941ecffde3a53f3c67
MD5 hash:
a43cd869a742f670df9ce345eb6de0cf
SHA1 hash:
3f292a28f9c996eb201560d6adcab4c84c3c5dd0
SH256 hash:
f739c2324026878adbbe89d3e975383c87f5451223590f85ff17c8bf1989841a
MD5 hash:
715a6a93470136846dca5d9915bb0ae9
SHA1 hash:
38b2c4fa5093dba37ce65a03d35a4a9540e0b9ff
SH256 hash:
4dc37311030b8c72b4a981543c2c13d862bc286f3b54761bc67209af9769c7f1
MD5 hash:
302aa99040f8a565504818d439609c78
SHA1 hash:
c250563bb2f6aa364525015e87ce35ffa936d166
SH256 hash:
ce2896d96147764e1beac08ab1a838d839d89fdd3ac6dda44a8d828248518e74
MD5 hash:
fb57d955a1ba2372d2d8b3a8c222e591
SHA1 hash:
cb131a7560a070312cd7a25a5a4060cd46785469
Detections:
win_rms_a0 win_rms_auto
SH256 hash:
1900ff6e192b9c247c0ce261b0d99d72bcfd9af9c8a94f2b0e88871a76eb662e
MD5 hash:
c9bfc737cb069c9222294a25160ba101
SHA1 hash:
1f56085421306ccfdcf26604f43662e1aec9cddc
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments