MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2a843168b37124afc8a8daf552f5f8f5677776f82d85bc1828cffc15035018ce. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 2a843168b37124afc8a8daf552f5f8f5677776f82d85bc1828cffc15035018ce
SHA3-384 hash: e0629e7eb1c849274242813ee076b28057c1317dd49a0308d6fa36eb048f5e94f85049a3a8a2889a9d75e1949afee271
SHA1 hash: 0c3327a8664b70388883fbedf956ea211c732458
MD5 hash: a08eb2a4884cc580b159ac0cd73a932c
humanhash: sad-uncle-montana-minnesota
File name:SQ09697-PO-06979-PR-00697-MQ-06998-2026.JS
Download: download sample
Signature RemcosRAT
File size:7'353'604 bytes
First seen:2026-04-17 13:59:16 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 98304:DQsJ+NbrQc6mmNr+mnVQeGgggJhzBVEjsATDnm2aHDZBZNG2m1axz5ojH95gLlB9:Dj+bvyN7y2V0TDm2Y7xzSjHPklBAuOPk
TLSH T118765244E2B8A23776D2D78D983AD931484F68572A99CB61302FD22C3D1CF5387646EF
Magika txt
Reporter abuse_ch
Tags:js RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
108
Origin country :
SE SE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
92.5%
Tags:
autorun autoit emotet
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug autoit dropper evasive expired-cert fingerprint keylogger lolbin obfuscated persistence repaired schtasks
Verdict:
Malicious
File Type:
js
First seen:
2026-04-17T07:36:00Z UTC
Last seen:
2026-04-18T10:42:00Z UTC
Hits:
~10
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
56 / 100
Signature
JavaScript source code contains functionality to generate code involving a shell, file or stream
Multi AV Scanner detection for submitted file
Sigma detected: WScript or CScript Dropper
Behaviour
Behavior Graph:
Gathering data
Threat name:
Win32.Trojan.Qwexlafiba
Status:
Malicious
First seen:
2026-04-17 12:56:02 UTC
File Type:
Text (JavaScript)
AV detection:
7 of 38 (18.42%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:donutloader family:remcos botnet:remotehost collection discovery execution loader persistence rat suricata
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Command and Scripting Interpreter: JavaScript
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Accesses Microsoft Outlook accounts
Checks computer location settings
Executes dropped EXE
Detected Nirsoft tools
NirSoft MailPassView
NirSoft WebBrowserPassView
Detects DonutLoader
Family: DonutLoader
Family: Remcos
Suricata alert: REMCOS RAT Malware Inbound C2 Communication
Suricata alert: REMCOS RAT Malware Outbound C2 Communication
Malware Config
C2 Extraction:
www.malt-ae.com:2404
www.malt-aebackup1.com:2404
www.malt-aebackup2.com:2404
www.malt-aebackup3.com:2404
www.malt-aebackup4.com:2404
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments