MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 226d0ea20dccb9f0b091d02ccacaec73b537fc9b61157eff759b74d742d48b00. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RemcosRAT
Vendor detections: 11
| SHA256 hash: | 226d0ea20dccb9f0b091d02ccacaec73b537fc9b61157eff759b74d742d48b00 |
|---|---|
| SHA3-384 hash: | d205a9bcc84033e70f1e750839bc15ffaea91d91c29ef923edb662b5e8ad559a29ef4bfe005ef4db92da667bb9897ac8 |
| SHA1 hash: | af1a1a0fc3565f7dcbeceab6928655e52d917627 |
| MD5 hash: | e92654f27c4cd3ad6a3a12f3a0be1469 |
| humanhash: | johnny-fanta-bacon-friend |
| File name: | Scan3094-03.exe |
| Download: | download sample |
| Signature | RemcosRAT |
| File size: | 310'140 bytes |
| First seen: | 2021-10-07 06:11:05 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | b76363e9cb88bf9390860da8e50999d2 (464 x Formbook, 184 x AgentTesla, 122 x SnakeKeylogger) |
| ssdeep | 6144:b8LxBqW4Ci9iLUGoOeMqci94cR7hbFbSPVx6tgsnzcbD2rFKquh3dyLN:nW4n8GOeMJLcRDSPH6tioFK9htyh |
| Threatray | 704 similar samples on MalwareBazaar |
| TLSH | T19F641203F2D1C9B7E1A01F3245F5B938E3BA435CE0595C838374ED6B2AA29E78358C46 |
| File icon (PE): | |
| dhash icon | 4f07090d0d014f8c (47 x SnakeKeylogger, 17 x Formbook, 13 x AgentTesla) |
| Reporter | |
| Tags: | exe RemcosRAT |
Intelligence
File Origin
# of uploads :
1
# of downloads :
153
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Scan3094-03.exe
Verdict:
Malicious activity
Analysis date:
2021-10-07 06:12:17 UTC
Tags:
rat remcos
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
Remcos
Result
Verdict:
Clean
Maliciousness:
Behaviour
Creating a file in the %temp% directory
Creating a file
Creating a window
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
overlay packed
Result
Threat name:
Remcos
Detection:
malicious
Classification:
rans.troj.spyw.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Deletes itself after installation
Detected Remcos RAT
Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Uses dynamic DNS services
Yara detected Remcos RAT
Behaviour
Behavior Graph:
Detection:
remcos
Threat name:
Win32.Backdoor.Remcos
Status:
Malicious
First seen:
2021-10-06 05:05:06 UTC
AV detection:
14 of 45 (31.11%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
remcos
Similar samples:
+ 694 additional samples on MalwareBazaar
Result
Malware family:
remcos
Score:
10/10
Tags:
family:remcos persistence rat upx
Behaviour
Modifies registry class
Suspicious use of WriteProcessMemory
NSIS installer
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Deletes itself
Loads dropped DLL
UPX packed file
Executes dropped EXE
Remcos
Unpacked files
SH256 hash:
226d0ea20dccb9f0b091d02ccacaec73b537fc9b61157eff759b74d742d48b00
MD5 hash:
e92654f27c4cd3ad6a3a12f3a0be1469
SHA1 hash:
af1a1a0fc3565f7dcbeceab6928655e52d917627
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.