MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 259a4ac57f8484acd58a5c354bf74d677a8676e27ba38222862c45f0e95aa323. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 19


Intelligence 19 IOCs YARA 6 File information Comments

SHA256 hash: 259a4ac57f8484acd58a5c354bf74d677a8676e27ba38222862c45f0e95aa323
SHA3-384 hash: a9bd71171eeb936c6cc3b8f2a776eba206e187a8fa2140adf2ec62f9b9e02c3fc5425e5040fb7c34058aa6f7dd194229
SHA1 hash: 1900ed77a2a2140680bfa9b94337484e0d24565e
MD5 hash: 98d2836abec61eeb36a6c2eefe3dd4c5
humanhash: twenty-nuts-bacon-connecticut
File name:QUOT005643SEN-09182025.exe
Download: download sample
Signature RemcosRAT
File size:948'736 bytes
First seen:2025-08-12 16:37:10 UTC
Last seen:2025-08-29 10:22:49 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 24576:1nykduLVRdo87XCqOp2fylv580o+qC9Zkyvg:o3LbK87yq+vy0o+qIZZv
Threatray 1'303 similar samples on MalwareBazaar
TLSH T14715228546E28C16D5E78BB24851D27A13F4BE8CFE21D7071FE4BCDF792A7505A0A382
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter threatcat_ch
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
5
# of downloads :
80
Origin country :
CH CH
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
QUOT005643SEN-09182025.exe
Verdict:
Malicious activity
Analysis date:
2025-08-13 01:30:41 UTC
Tags:
netreactor rat remcos auto-reg auto-sch-xml remote

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
95.7%
Tags:
remcos micro spawn sage
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a process with a hidden window
Creating a file in the %temp% directory
Launching a process
Restart of the analyzed sample
Creating a file
Сreating synchronization primitives
Creating a process from a recently created file
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated packed packed packer_detected
Result
Threat name:
Detection:
malicious
Classification:
rans.troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Contains functionality to bypass UAC (CMSTPLUA)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Creates autostart registry keys with suspicious names
Detected Remcos RAT
Found malware configuration
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Remcos
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM3
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1755475 Sample: QUOT005643SEN-09182025.exe Startdate: 12/08/2025 Architecture: WINDOWS Score: 100 82 geoplugin.net 2->82 90 Suricata IDS alerts for network traffic 2->90 92 Found malware configuration 2->92 94 Malicious sample detected (through community Yara rule) 2->94 96 10 other signatures 2->96 10 QUOT005643SEN-09182025.exe 7 2->10         started        14 uXruDqiGCIWA.exe 5 2->14         started        16 remcos.exe 2->16         started        18 3 other processes 2->18 signatures3 process4 dnsIp5 72 C:\Users\user\AppData\...\uXruDqiGCIWA.exe, PE32 10->72 dropped 74 C:\Users\...\uXruDqiGCIWA.exe:Zone.Identifier, ASCII 10->74 dropped 76 C:\Users\user\AppData\Local\...\tmp8776.tmp, XML 10->76 dropped 78 C:\Users\...\QUOT005643SEN-09182025.exe.log, ASCII 10->78 dropped 112 Contains functionality to bypass UAC (CMSTPLUA) 10->112 114 Contains functionalty to change the wallpaper 10->114 116 Contains functionality to steal Chrome passwords or cookies 10->116 120 4 other signatures 10->120 21 QUOT005643SEN-09182025.exe 2 4 10->21         started        25 powershell.exe 23 10->25         started        37 2 other processes 10->37 118 Multi AV Scanner detection for dropped file 14->118 27 uXruDqiGCIWA.exe 14->27         started        29 schtasks.exe 14->29         started        31 remcos.exe 16->31         started        33 schtasks.exe 16->33         started        84 127.0.0.1 unknown unknown 18->84 80 C:\ProgramData\Microsoft80etwork\...\qmgr.jfm, DOS 18->80 dropped 35 remcos.exe 18->35         started        39 3 other processes 18->39 file6 signatures7 process8 file9 68 C:\ProgramData\Remcos\remcos.exe, PE32 21->68 dropped 70 C:\ProgramData\...\remcos.exe:Zone.Identifier, ASCII 21->70 dropped 98 Detected Remcos RAT 21->98 100 Creates autostart registry keys with suspicious names 21->100 41 remcos.exe 5 21->41         started        102 Loading BitLocker PowerShell Module 25->102 44 conhost.exe 25->44         started        46 conhost.exe 29->46         started        48 conhost.exe 33->48         started        50 conhost.exe 39->50         started        52 conhost.exe 39->52         started        signatures10 process11 signatures12 108 Multi AV Scanner detection for dropped file 41->108 110 Adds a directory exclusion to Windows Defender 41->110 54 remcos.exe 41->54         started        58 powershell.exe 23 41->58         started        60 schtasks.exe 41->60         started        62 conhost.exe 48->62         started        process13 dnsIp14 86 109.248.144.169, 49681, 8088 DATACLUB-SE Russian Federation 54->86 88 geoplugin.net 178.237.33.50, 49682, 80 ATOM86-ASATOM86NL Netherlands 54->88 104 Detected Remcos RAT 54->104 106 Loading BitLocker PowerShell Module 58->106 64 conhost.exe 58->64         started        66 conhost.exe 60->66         started        signatures15 process16
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Snakekeylogger
Status:
Malicious
First seen:
2025-08-12 13:55:47 UTC
File Type:
PE (.Net Exe)
Extracted files:
6
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos discovery execution persistence rat
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Command and Scripting Interpreter: PowerShell
Remcos
Remcos family
Malware Config
C2 Extraction:
109.248.144.169:8088
Unpacked files
SH256 hash:
259a4ac57f8484acd58a5c354bf74d677a8676e27ba38222862c45f0e95aa323
MD5 hash:
98d2836abec61eeb36a6c2eefe3dd4c5
SHA1 hash:
1900ed77a2a2140680bfa9b94337484e0d24565e
SH256 hash:
136a60c9c8c39591bd8dc97f1fb75cead5c9f8ed578ea0fee8a6732254dbd6d5
MD5 hash:
ff838709ab4f29234fdbe779e474fa2a
SHA1 hash:
80f5ae51201c00596589e050cdc445da93403991
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24
Parent samples :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 hash:
eb0400a2d60f66971cb27b5377b29b1f2d1d6480b1f6d76cff7bbd9b83d0e450
MD5 hash:
1c1a5bc208954484a5a98a73fe8e6aff
SHA1 hash:
caa54b7331fc685c37376858b64ab36b27888c19
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

Executable exe 259a4ac57f8484acd58a5c354bf74d677a8676e27ba38222862c45f0e95aa323

(this sample)

  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high

Comments