MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2bd30faef9e89799bc33f076afc8f3521bc84018c8e27829e8f475ee1c8dc13b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 2bd30faef9e89799bc33f076afc8f3521bc84018c8e27829e8f475ee1c8dc13b
SHA3-384 hash: b349934c1a6f3b02d14912537cdc7c52ddc45d490a982cdf9bee9cdd73bbc1d0ea36334a6554256833fcdee58d8014a2
SHA1 hash: 11b482fb990a4d6c6720af18ac628f5f060f1cbe
MD5 hash: 361908600e2dd73063e91d7cd3a4dbbd
humanhash: fish-south-virginia-vermont
File name:CHATTING.EXE
Download: download sample
Signature RemcosRAT
File size:110'592 bytes
First seen:2020-03-30 18:43:40 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a157e3e198b305ca2d7d3824259be243 (1 x RemcosRAT)
ssdeep 1536:uinIaAogvHoGZ64Z/dx0o1bcaeMFWTkMaPIkQDvBm:uslst6wL0m7RQ0
Threatray 1'475 similar samples on MalwareBazaar
TLSH 82B3F816F900BC95DDEC4DB78771CA9C53567E276E0AAA03348C3ECFBAB1250714299B
Reporter abuse_ch
Tags:COVID-19 exe GuLoader RemcosRAT


Avatar
abuse_ch
COVID-19 malspam distributing GuLoader->RemcosRAT:

HELO: mta0.veresegyhaz.tk
Sending IP: 161.35.58.139
From: WHO<info@veresegyhaz.tk>
Subject: Re: COVID-19 Relief: How to Access Complimentary Products
Attachment: Covid-19.001 (contains "CHATTING.EXE")

GuLoader payload URL (RemcosRAT):
https://onedrive.live.com/download?cid=CFD8E120D47DF1A4&resid=CFD8E120D47DF1A4%211132&authkey=AFrU_0NCOPZWS7A

RemcosRAT C2:
91.193.75.126:2019

% Information related to '91.193.75.0 - 91.193.75.255'

% Abuse contact for '91.193.75.0 - 91.193.75.255' is 'abuse@kgb-vpn.org'

inetnum: 91.193.75.0 - 91.193.75.255
netname: NON-LOGGING-VPN-SERVICE
descr: Please note that we don't store any user data.
descr: Our main effort is not to make money, but to preserve values like the
descr: freedom of expression, the freedom of press, the right to data protection
descr: and informational self-determination.
descr: We ask all employees of Spamhaus and all self-proclaimed deputy sheriffs
descr: to stop your attacks against us.
country: EU

Intelligence


File Origin
# of uploads :
1
# of downloads :
100
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-03-30 19:35:29 UTC
File Type:
PE (Exe)
Extracted files:
2
AV detection:
24 of 30 (80.00%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropping
RemcosRAT
  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
VB_APILegacy Visual Basic API usedMSVBVM60.DLL::EVENT_SINK_AddRef

Comments