MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2e15752e1ce078c54355c354cc29ee8d75d48aa3c9821c81c2a74e7f679edb21. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 17


Intelligence 17 IOCs YARA 5 File information Comments

SHA256 hash: 2e15752e1ce078c54355c354cc29ee8d75d48aa3c9821c81c2a74e7f679edb21
SHA3-384 hash: 9fc3c6da6478f7b3c546d21f902dbfd1c8e9db8d70391fe77c827b283821a94950705db33804cd867ea378f7eb4c4080
SHA1 hash: 59f9c4b93074cb279b72c2bc99ceed89aadc522d
MD5 hash: 9e17a6ac573bc582f7e020afeca33433
humanhash: carolina-april-hot-grey
File name:SecuriteInfo.com.Win32.PWSX-gen.16394.5888
Download: download sample
Signature RemcosRAT
File size:997'376 bytes
First seen:2023-12-01 10:24:31 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'600 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 12288:7xdIBmU4EF5xiq0tHQ4jnteL7yXfzLjrMuhg6BJMRnokKdH4KVzoZG1v7j+OX0QL:7xy4EXcq0tw4jMCrjMqwyddzN+pQL
TLSH T1C7250120B2F86F62C5FE57F104555A100BF2789EA47DF32D0DDAA4DA7666F005A82F23
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter SecuriteInfoCom
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
339
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
SecuriteInfo.com.Win32.PWSX-gen.16394.5888
Verdict:
Malicious activity
Analysis date:
2023-12-01 10:27:11 UTC
Tags:
rat remcos remote stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Creating a process with a hidden window
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a file in the %temp% directory
Launching a process
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
rans.phis.troj.spyw.expl.evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-12-01 08:34:27 UTC
File Type:
PE (.Net Exe)
Extracted files:
17
AV detection:
14 of 23 (60.87%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:sammy stub collection rat spyware stealer
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses Microsoft Outlook accounts
Checks computer location settings
Reads user/profile data of web browsers
NirSoft MailPassView
NirSoft WebBrowserPassView
Nirsoft
Remcos
Malware Config
C2 Extraction:
91.92.250.65:2404
127.0.0.1:1606
sameruo.ddns.net:1606
Unpacked files
SH256 hash:
cd89fc830c18fce902789d7980623843c7c3beabd05b6233dd0cbd496f53291e
MD5 hash:
f530184891867ddbc3fcff6ffe1428cc
SHA1 hash:
db09d7d558d6a213080064ded3a448a671af90a8
Detections:
Remcos win_remcos_w0 win_remcos_auto malware_windows_remcos_rat INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM win_remcos_rat_unpacked
SH256 hash:
bc99dcc182eaf17394c34611c1aef4ad45c3079ae116c19caa17620d64c39f7c
MD5 hash:
84fe0cc42b4f30e7b6f58c92f9ad3d56
SHA1 hash:
d753cc7cc8e2927f9cde57fb67b5bceebd2f5fd2
SH256 hash:
d01f3dea3851602ba5a0586c60430d286adf6fcc7e17aab080601a66630606e5
MD5 hash:
579197d4f760148a9482d1ebde113259
SHA1 hash:
cf6924eb360c7e5a117323bebcb6ee02d2aec86d
SH256 hash:
0e8a5f6bd3e915b9d2fae9428730dc5017348d23b622bccbb1971e352052734b
MD5 hash:
56feb04fdc8b0453c62267ac204ed555
SHA1 hash:
7d41fb41cac90bea85cb6691a5945568115cbcbf
SH256 hash:
be8a371991e23db05b68a8798cb03c7898e38755e0beeb2a1b1f703e6ad0e459
MD5 hash:
f1798631a24b2eedff047aa6003f5160
SHA1 hash:
07429952471a44bbfae836c7fc7e085b4947ecde
SH256 hash:
2e15752e1ce078c54355c354cc29ee8d75d48aa3c9821c81c2a74e7f679edb21
MD5 hash:
9e17a6ac573bc582f7e020afeca33433
SHA1 hash:
59f9c4b93074cb279b72c2bc99ceed89aadc522d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AgentTesla_DIFF_Common_Strings_01
Author:schmidtsz
Description:Identify partial Agent Tesla strings
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments