MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1a261ffbe76d224c7d9f9136723f1cdf35f661d0e5a38f43a7ee2cb31606f359. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 11


Intelligence 11 IOCs YARA 1 File information Comments

SHA256 hash: 1a261ffbe76d224c7d9f9136723f1cdf35f661d0e5a38f43a7ee2cb31606f359
SHA3-384 hash: 002c738effc652c906447352c45190d4aa76b6145d5fd8d2a46a1ca9c95fea0db2ddbe3fa0854e585ef916e2c373d903
SHA1 hash: 90ede21c73465a6cc4b16b5913f765119bb5b335
MD5 hash: e1183028143d612705f5723cc7b3b4df
humanhash: eighteen-snake-wisconsin-juliet
File name:DHL_119040 receipt document,pdf.exe
Download: download sample
Signature RemcosRAT
File size:1'199'104 bytes
First seen:2021-10-19 08:27:10 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a410078918980fce320f92b4875de320 (4 x Formbook, 2 x RemcosRAT, 2 x NetWire)
ssdeep 12288:0xwB6jcB+VlDdNvGOLPs46HcqC9Q1LEYLtwaufAkupubMkkUshtgQowaI9hj8mey:Gr1bvGObs46nCmLJwkuwkPZwakpKhG
Threatray 788 similar samples on MalwareBazaar
TLSH T1FE458E74B1A041B2E1730EBD4E62F56C851DFE523F547D063AE07A5DABFBA40342628B
File icon (PE):PE icon
dhash icon fedcbb4d750f4c4c (9 x Formbook, 5 x RemcosRAT, 2 x NetWire)
Reporter abuse_ch
Tags:DHL exe RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
182
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
DNS request
Connection attempt
Sending a custom TCP request
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
88 / 100
Signature
Creates a thread in another existing process (thread injection)
Drops PE files to the user root directory
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Writes to foreign memory regions
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Woreflint
Status:
Malicious
First seen:
2021-10-19 08:28:07 UTC
AV detection:
10 of 45 (22.22%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:asedeybe persistence rat
Behaviour
Modifies registry key
Suspicious use of WriteProcessMemory
Adds Run key to start application
Remcos
Malware Config
C2 Extraction:
blowmymind.hopto.org:7676
Malware family:
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments