MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2f07a5d8c1e6ac465e5d306b0fb8335aa41f3204b9bf9793337a849a93921a9a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 2f07a5d8c1e6ac465e5d306b0fb8335aa41f3204b9bf9793337a849a93921a9a
SHA3-384 hash: 111acbe66edd9a1d72d6c1333b640c3e78f035bfa15929a7d6a6dd427b7886245e5b208d8920cadd95050766930810ad
SHA1 hash: bd452403c79c21b50183d8bf682227b946101c72
MD5 hash: b699bec737819f57226010d22fb35b91
humanhash: neptune-massachusetts-mobile-summer
File name:2f07a5d8c1e6ac465e5d306b0fb8335aa41f3204b9bf9793337a849a93921a9a
Download: download sample
Signature RemcosRAT
File size:313'344 bytes
First seen:2020-06-17 09:21:42 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'600 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 6144:mLawR6CTE4Ho7RgkqVJqqSuiqRTBLK4DNr:mLaZCTE4HoikqVJqvuiv4h
Threatray 897 similar samples on MalwareBazaar
TLSH 4C64AD89F6086264DC2D577951B6DC3003A37CBAA431E61D3ECA3D7B3EBB7925012927
Reporter JAMESWT_WT

Intelligence


File Origin
# of uploads :
1
# of downloads :
70
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-06-16 11:25:35 UTC
File Type:
PE (.Net Exe)
Extracted files:
6
AV detection:
26 of 31 (83.87%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
rat family:remcos
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of SetWindowsHookEx
Creates scheduled task(s)
Suspicious use of SetThreadContext
Uses the VBS compiler for execution
Remcos
Malware Config
C2 Extraction:
billion2020.ddns.net:1965
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments