MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 33b25ae8a09b3249f6f5a9971d563933e88d20dca6f2b761c308783e164de492. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 11


Intelligence 11 IOCs YARA 7 File information Comments

SHA256 hash: 33b25ae8a09b3249f6f5a9971d563933e88d20dca6f2b761c308783e164de492
SHA3-384 hash: f0ecab58a8c5ebb6b5d22a063b2402737b5212df60cd5e1977cd97a9ad29a0457dd2f3d8d7bdec9528715fd3edbbbb94
SHA1 hash: 342dc2af568d898f510455e6f5c7f937962dcc28
MD5 hash: 49318d20791b87d4bb0abca27ee83a67
humanhash: kitten-london-bulldog-nuts
File name:49318d20791b87d4bb0abca27ee83a67.exe
Download: download sample
Signature RemcosRAT
File size:4'094'464 bytes
First seen:2021-02-03 18:18:26 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 1536:SY9ux/IAQdcTNoR+yjbxqrtIJ0avo3X7eGSgFN:SY9ud+ie+AqrIhv67fF
Threatray 10 similar samples on MalwareBazaar
TLSH A916FF12BDCB26E8EB33B12142F8AC79906FB323145B8C7E5651CAC7132F9569D60F61
Reporter abuse_ch
Tags:exe RAT RemcosRAT


Avatar
abuse_ch
RemcosRAT C2:
ghdyuienah123.freedynamicdns.org:2006

Intelligence


File Origin
# of uploads :
1
# of downloads :
163
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
PI pymnt voucher.doc
Verdict:
Malicious activity
Analysis date:
2021-02-03 14:33:16 UTC
Tags:
exploit CVE-2017-11882 loader rat remcos keylogger

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Running batch commands
Creating a process with a hidden window
Launching a process
Adding an access-denied ACE
Creating a file
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a window
Deleting a recently created file
DNS request
Connection attempt
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process by context flags manipulation
Setting a global event handler for the keyboard
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Contains functionality to capture and log keystrokes
Contains functionality to hide a thread from the debugger
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Country aware sample found (crashes after keyboard check)
Delayed program exit found
Detected Remcos RAT
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 348178 Sample: 2Jld68U9eA.exe Startdate: 03/02/2021 Architecture: WINDOWS Score: 100 74 Malicious sample detected (through community Yara rule) 2->74 76 Multi AV Scanner detection for submitted file 2->76 78 Detected Remcos RAT 2->78 80 4 other signatures 2->80 11 2Jld68U9eA.exe 3 2->11         started        14 win.exe 4 2->14         started        16 win.exe 2->16         started        process3 signatures4 82 Contains functionality to steal Chrome passwords or cookies 11->82 84 Contains functionality to capture and log keystrokes 11->84 86 Contains functionality to inject code into remote processes 11->86 92 3 other signatures 11->92 18 2Jld68U9eA.exe 4 4 11->18         started        21 WerFault.exe 23 9 11->21         started        24 cmd.exe 1 11->24         started        88 Hides threads from debuggers 14->88 90 Injects a PE file into a foreign processes 14->90 26 cmd.exe 14->26         started        28 cmd.exe 16->28         started        process5 dnsIp6 62 C:\Users\user\AppData\Roaming\win.exe, PE32 18->62 dropped 64 C:\Users\user\...\win.exe:Zone.Identifier, ASCII 18->64 dropped 30 wscript.exe 1 18->30         started        68 192.168.2.1 unknown unknown 21->68 66 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 21->66 dropped 32 conhost.exe 24->32         started        34 timeout.exe 1 24->34         started        36 conhost.exe 26->36         started        38 timeout.exe 26->38         started        40 conhost.exe 28->40         started        42 timeout.exe 28->42         started        file7 process8 process9 44 cmd.exe 1 30->44         started        process10 46 win.exe 3 44->46         started        49 conhost.exe 44->49         started        signatures11 94 Multi AV Scanner detection for dropped file 46->94 96 Machine Learning detection for dropped file 46->96 98 Hides threads from debuggers 46->98 100 Injects a PE file into a foreign processes 46->100 51 cmd.exe 46->51         started        53 win.exe 46->53         started        56 WerFault.exe 46->56         started        process12 dnsIp13 58 conhost.exe 51->58         started        60 timeout.exe 51->60         started        70 ghdyuienah123.freedynamicdns.org 37.230.130.116, 2006 VOXILITYGB Netherlands 53->70 72 37.230.130.133, 2006, 49744 VOXILITYGB Netherlands 53->72 process14
Threat name:
ByteCode-MSIL.Trojan.Remcos
Status:
Malicious
First seen:
2021-02-03 17:17:53 UTC
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos persistence ransomware rat
Behaviour
Delays execution with timeout.exe
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Program crash
Enumerates physical storage devices
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Executes dropped EXE
Remcos
Unpacked files
SH256 hash:
0a8304bbf392d84147dd5d52d0a443a1203883f7535c954ce60daad231827177
MD5 hash:
f2610264d5fb01821cca8f1dc6cf0f6e
SHA1 hash:
1fe7596755037248c84bfb78ad1a1a46686ceae3
Detections:
win_remcos_g0
SH256 hash:
0d34c9051fdefa1034d6d10424f3f5aa9bf70327621ca8c5e2d385f88f0455e1
MD5 hash:
05f5a10dcfb0b9bc70ec1ad7cd2cd142
SHA1 hash:
ef355346904050115d1b446038dd82087a8ad7f3
SH256 hash:
33b25ae8a09b3249f6f5a9971d563933e88d20dca6f2b761c308783e164de492
MD5 hash:
49318d20791b87d4bb0abca27ee83a67
SHA1 hash:
342dc2af568d898f510455e6f5c7f937962dcc28
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_RemcosRAT
Author:abuse.ch
Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer
Author:ditekSHen
Description:detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:Parallax
Author:@bartblaze
Description:Identifies Parallax RAT.
Rule name:remcos_rat
Author:jeFF0Falltrades
Rule name:REMCOS_RAT_variants

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

Executable exe 33b25ae8a09b3249f6f5a9971d563933e88d20dca6f2b761c308783e164de492

(this sample)

  
Delivery method
Distributed via web download

Comments