MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 299f192a7f995ee35b2b3e9a1c9e2bb2e973bda11c66f7402d1b65af9ec8eec4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 12


Intelligence 12 IOCs YARA 9 File information Comments

SHA256 hash: 299f192a7f995ee35b2b3e9a1c9e2bb2e973bda11c66f7402d1b65af9ec8eec4
SHA3-384 hash: 0b1bdef8d6954108deb7bf3b3d06f5a8b946da02344e3ede2c6c7c243894980d552473eb0011b8d513d784e1c09fa3c2
SHA1 hash: d1b37ba202da3a6efa206d4e78b6311062a915f8
MD5 hash: 6c010d4933aa71181eb78b86d53567a1
humanhash: thirteen-south-football-magnesium
File name:SecuriteInfo.com.Variant.Graftor.929798.12649.27448
Download: download sample
Signature RemcosRAT
File size:198'656 bytes
First seen:2021-02-26 10:49:04 UTC
Last seen:2021-02-28 07:04:39 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 1561dea7c43e42cb8034f851b549d2c8 (1 x RemcosRAT)
ssdeep 3072:M8lewZQf6fAAkp/RIrYU61tljygUeIUzBfB1e808M5s5:VZ86oA7azd7v1e83
Threatray 1'597 similar samples on MalwareBazaar
TLSH C314AEA276A0D032C483193055B4C2B169BABC71DB6895C7B7B83F6E6FB13D12236753
Reporter SecuriteInfoCom
Tags:RemcosRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
121
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Importante tercera notificación de embargo(2).eml
Verdict:
Malicious activity
Analysis date:
2021-02-25 22:27:56 UTC
Tags:
trojan amadey loader opendir stealer rat remcos keylogger

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %AppData% subdirectories
Enabling the 'hidden' option for recently created files
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a process with a hidden window
Creating a window
Deleting a recently created file
Running batch commands
Sending a UDP request
DNS request
Sending a custom TCP request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Setting a global event handler for the keyboard
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
rans.troj.spyw.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Detected Remcos RAT
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Uses dynamic DNS services
Yara detected Remcos RAT
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Glupteba
Status:
Malicious
First seen:
2021-02-25 23:48:43 UTC
AV detection:
31 of 48 (64.58%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos persistence rat
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
Remcos
Malware Config
C2 Extraction:
resener.duckdns.org:3202
Unpacked files
SH256 hash:
021873605685655982bab07f3a0c7dc127f416b5c022232cac8127ed086efa1c
MD5 hash:
4b5d7f5ec72fcd77b3231e83aa7b6bd5
SHA1 hash:
4a1d8551786833fe788d106653348122144f2119
Detections:
win_remcos_g0 win_remcos_auto
SH256 hash:
299f192a7f995ee35b2b3e9a1c9e2bb2e973bda11c66f7402d1b65af9ec8eec4
MD5 hash:
6c010d4933aa71181eb78b86d53567a1
SHA1 hash:
d1b37ba202da3a6efa206d4e78b6311062a915f8
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_RemcosRAT
Author:abuse.ch
Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer
Author:ditekSHen
Description:detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:Parallax
Author:@bartblaze
Description:Identifies Parallax RAT.
Rule name:Remcos
Author:JPCERT/CC Incident Response Group
Description:detect Remcos in memory
Rule name:remcos_rat
Author:jeFF0Falltrades
Rule name:REMCOS_RAT_variants
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

Executable exe 299f192a7f995ee35b2b3e9a1c9e2bb2e973bda11c66f7402d1b65af9ec8eec4

(this sample)

  
Delivery method
Distributed via web download

Comments