MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1a261ffbe76d224c7d9f9136723f1cdf35f661d0e5a38f43a7ee2cb31606f359. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RemcosRAT
Vendor detections: 11
| SHA256 hash: | 1a261ffbe76d224c7d9f9136723f1cdf35f661d0e5a38f43a7ee2cb31606f359 |
|---|---|
| SHA3-384 hash: | 002c738effc652c906447352c45190d4aa76b6145d5fd8d2a46a1ca9c95fea0db2ddbe3fa0854e585ef916e2c373d903 |
| SHA1 hash: | 90ede21c73465a6cc4b16b5913f765119bb5b335 |
| MD5 hash: | e1183028143d612705f5723cc7b3b4df |
| humanhash: | eighteen-snake-wisconsin-juliet |
| File name: | DHL_119040 receipt document,pdf.exe |
| Download: | download sample |
| Signature | RemcosRAT |
| File size: | 1'199'104 bytes |
| First seen: | 2021-10-19 08:27:10 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | a410078918980fce320f92b4875de320 (4 x Formbook, 2 x RemcosRAT, 2 x NetWire) |
| ssdeep | 12288:0xwB6jcB+VlDdNvGOLPs46HcqC9Q1LEYLtwaufAkupubMkkUshtgQowaI9hj8mey:Gr1bvGObs46nCmLJwkuwkPZwakpKhG |
| Threatray | 788 similar samples on MalwareBazaar |
| TLSH | T1FE458E74B1A041B2E1730EBD4E62F56C851DFE523F547D063AE07A5DABFBA40342628B |
| File icon (PE): | |
| dhash icon | fedcbb4d750f4c4c (9 x Formbook, 5 x RemcosRAT, 2 x NetWire) |
| Reporter | |
| Tags: | DHL exe RemcosRAT |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | BitcoinAddress |
|---|---|
| Author: | Didier Stevens (@DidierStevens) |
| Description: | Contains a valid Bitcoin address |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.