MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1f068fe39ea82125b5fcf7485d14fc4870d000924007f4207f9b7adbb33a5f0f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 17


Intelligence 17 IOCs YARA 4 File information Comments

SHA256 hash: 1f068fe39ea82125b5fcf7485d14fc4870d000924007f4207f9b7adbb33a5f0f
SHA3-384 hash: 83e66812fcac6fae0f1a608ea7c7bd59fb34696871bbdbc1067964e5b4c15dc734a5f58ab921840b1bff70e7e3fff4ae
SHA1 hash: 652a31566727ee8ea397fda4b6cd1b61920c00ed
MD5 hash: 13dbbd2d106dc98ffc09b826956c07c3
humanhash: five-asparagus-october-nineteen
File name:240155-MTCO-Purchase Note.scr
Download: download sample
Signature RemcosRAT
File size:1'342'464 bytes
First seen:2025-09-08 23:02:32 UTC
Last seen:2025-09-09 09:40:11 UTC
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 24576:1s/YfTcu8FSXDfBokI8K8sUxT15jaSlOzb81a10uoaZ4FS:12TwzfmkIV8sSrj0Ca1ZWS
Threatray 28 similar samples on MalwareBazaar
TLSH T1F555DFA0E1AE7CD3D11E45B2153879610A72F7A3E9FDC5BA0A7571494AF3BD33A40C0A
TrID 56.5% (.EXE) Win64 Executable (generic) (10522/11/4)
11.0% (.ICL) Windows Icons Library (generic) (2059/9)
10.9% (.EXE) OS/2 Executable (generic) (2029/13)
10.7% (.EXE) Generic Win/DOS Executable (2002/3)
10.7% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter cocaman
Tags:exe RemcosRAT scr

Intelligence


File Origin
# of uploads :
4
# of downloads :
99
Origin country :
CH CH
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
240155-MTCO-Purchase Note.scr
Verdict:
Malicious activity
Analysis date:
2025-09-08 23:04:39 UTC
Tags:
rat remcos remote auto-sch-xml

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Suspicious
Score:
50%
Tags:
malware
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
masquerade obfuscated packed packed packer_detected
Verdict:
Malicious
File Type:
exe x64
First seen:
2025-09-08T10:04:00Z UTC
Last seen:
2025-09-08T10:04:00Z UTC
Hits:
~1000
Detections:
PDM:Trojan.Win32.Generic Trojan.MSIL.Taskun.sb Backdoor.Remcos.HTTP.C&C Trojan.MSIL.Crypt.sb HEUR:Trojan.MSIL.Taskun.sb HEUR:Backdoor.MSIL.Remcos.gen
Result
Threat name:
Detection:
malicious
Classification:
phis.troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
Attempt to bypass Chrome Application-Bound Encryption
C2 URLs / IPs found in malware configuration
Contains functionality to bypass UAC (CMSTPLUA)
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Detected Remcos RAT
Found evasive API chain checking for user administrative privileges
Found hidden mapped module (file has been removed from disk)
Found malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Potential Data Stealing Via Chromium Headless Debugging
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Remcos
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Yara detected WebBrowserPassView password recovery tool
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1773619 Sample: 240155-MTCO-Purchase Note.scr.exe Startdate: 09/09/2025 Architecture: WINDOWS Score: 100 67 geoplugin.net 2->67 85 Suricata IDS alerts for network traffic 2->85 87 Found malware configuration 2->87 89 Malicious sample detected (through community Yara rule) 2->89 91 16 other signatures 2->91 9 240155-MTCO-Purchase Note.scr.exe 7 2->9         started        13 vZjeokiflykWZh.exe 5 2->13         started        signatures3 process4 file5 59 C:\Users\user\AppData\...\vZjeokiflykWZh.exe, PE32+ 9->59 dropped 61 C:\...\vZjeokiflykWZh.exe:Zone.Identifier, ASCII 9->61 dropped 63 C:\Users\user\AppData\Local\...\tmpF450.tmp, XML 9->63 dropped 65 C:\...\240155-MTCO-Purchase Note.scr.exe.log, CSV 9->65 dropped 93 Writes to foreign memory regions 9->93 95 Allocates memory in foreign processes 9->95 97 Modifies the context of a thread in another process (thread injection) 9->97 99 Adds a directory exclusion to Windows Defender 9->99 15 vbc.exe 10 18 9->15         started        20 powershell.exe 23 9->20         started        22 powershell.exe 23 9->22         started        28 2 other processes 9->28 101 Multi AV Scanner detection for dropped file 13->101 103 Injects a PE file into a foreign processes 13->103 24 vbc.exe 13->24         started        26 schtasks.exe 13->26         started        signatures6 process7 dnsIp8 69 69.5.189.18, 2404, 49715, 49716 OMNISUS United States 15->69 71 geoplugin.net 178.237.33.50, 49719, 80 ATOM86-ASATOM86NL Netherlands 15->71 73 127.0.0.1 unknown unknown 15->73 51 C:\Users\user\AppData\Local\Temp\TH9347.tmp, PE32+ 15->51 dropped 53 C:\Users\user\AppData\Local\Temp\TH9143.tmp, MS-DOS 15->53 dropped 55 C:\Users\user\AppData\Local\Temp\TH90C5.tmp, MS-DOS 15->55 dropped 57 3 other malicious files 15->57 dropped 75 Contains functionality to bypass UAC (CMSTPLUA) 15->75 77 Detected Remcos RAT 15->77 79 Attempt to bypass Chrome Application-Bound Encryption 15->79 83 9 other signatures 15->83 30 RmClient.exe 15->30         started        33 RmClient.exe 15->33         started        35 RmClient.exe 15->35         started        47 3 other processes 15->47 81 Loading BitLocker PowerShell Module 20->81 37 conhost.exe 20->37         started        39 WmiPrvSE.exe 20->39         started        41 conhost.exe 22->41         started        43 conhost.exe 26->43         started        45 conhost.exe 28->45         started        file9 signatures10 process11 signatures12 105 Tries to steal Mail credentials (via file registry) 30->105 107 Tries to harvest and steal browser information (history, passwords, etc) 30->107 109 Tries to steal Instant Messenger accounts or passwords 33->109 111 Tries to steal Mail credentials (via file / registry access) 33->111 49 conhost.exe 47->49         started        process13
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
.Net Executable Managed .NET PDB Path PE (Portable Executable) PE File Layout SOS: 0.43 Win 64 Exe x64
Threat name:
Win64.Backdoor.Remcos
Status:
Malicious
First seen:
2025-09-08 19:12:35 UTC
File Type:
PE+ (.Net Exe)
Extracted files:
13
AV detection:
23 of 38 (60.53%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos collection credential_access discovery execution persistence rat stealer
Behaviour
Enumerates system info in registry
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Suspicious use of SetThreadContext
Accesses Microsoft Outlook accounts
Checks computer location settings
Uses the VBS compiler for execution
Command and Scripting Interpreter: PowerShell
Uses browser remote debugging
Detected Nirsoft tools
NirSoft MailPassView
NirSoft WebBrowserPassView
Remcos
Remcos family
Unpacked files
SH256 hash:
1f068fe39ea82125b5fcf7485d14fc4870d000924007f4207f9b7adbb33a5f0f
MD5 hash:
13dbbd2d106dc98ffc09b826956c07c3
SHA1 hash:
652a31566727ee8ea397fda4b6cd1b61920c00ed
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:NET
Author:malware-lu
Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

Executable exe 1f068fe39ea82125b5fcf7485d14fc4870d000924007f4207f9b7adbb33a5f0f

(this sample)

Comments