MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 34876c5bdba001a4dcedd74beb4c1cfb5742da353f9735a27f1e787a6339d60f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 13


Intelligence 13 IOCs YARA 9 File information Comments

SHA256 hash: 34876c5bdba001a4dcedd74beb4c1cfb5742da353f9735a27f1e787a6339d60f
SHA3-384 hash: ac086a13b6f27acce56e06c9f2aee579294ed46db4394a4fae5c3dbb8358a5ffb87387577b6a7c55c0929bfc03faa365
SHA1 hash: 489140a2f2c39f530bdc6ca4ae91d2b117be7569
MD5 hash: 6d3777e2b864ec0c83cc14fc137941f6
humanhash: harry-victor-sierra-timing
File name:7cc5360128f822bc2ddf096d63fe8e2d.exe
Download: download sample
Signature RemcosRAT
File size:601'088 bytes
First seen:2021-03-04 07:27:07 UTC
Last seen:2021-03-04 09:45:47 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'743 x AgentTesla, 19'608 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 12288:DgKlpFGj67VHH8n6pevmn9N/FaChKzfI6B6k6p:kYJHFQAz/FgDI6By
Threatray 2'032 similar samples on MalwareBazaar
TLSH 20D417E4126E512FD033FAB9BB84945CC2D566113E0BE75A9A8059CF4AD3E31DF809E3
Reporter abuse_ch
Tags:exe RAT RemcosRAT


Avatar
abuse_ch
RemcosRAT C2:
lovedaysde.duckdns.org

Intelligence


File Origin
# of uploads :
2
# of downloads :
155
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
7cc5360128f822bc2ddf096d63fe8e2d.exe
Verdict:
Malicious activity
Analysis date:
2021-03-04 07:37:32 UTC
Tags:
rat remcos trojan stealer keylogger

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Creating a file
Creating a file in the %AppData% subdirectories
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a process with a hidden window
Deleting a recently created file
Running batch commands
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large strings
C2 URLs / IPs found in malware configuration
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Detected Remcos RAT
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Sigma detected: Suspicious Svchost Process
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file access)
Uses dynamic DNS services
Yara detected Remcos RAT
Yara detected WebBrowserPassView password recovery tool
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 363092 Sample: 7cc5360128f822bc2ddf096d63f... Startdate: 04/03/2021 Architecture: WINDOWS Score: 100 76 Found malware configuration 2->76 78 Malicious sample detected (through community Yara rule) 2->78 80 Multi AV Scanner detection for submitted file 2->80 82 10 other signatures 2->82 11 7cc5360128f822bc2ddf096d63fe8e2d.exe 3 2->11         started        15 remcos.exe 2 2->15         started        17 remcos.exe 2 2->17         started        process3 file4 64 7cc5360128f822bc2ddf096d63fe8e2d.exe.log, ASCII 11->64 dropped 92 Contains functionality to steal Chrome passwords or cookies 11->92 94 Contains functionality to capture and log keystrokes 11->94 96 Contains functionality to inject code into remote processes 11->96 98 Contains functionality to steal Firefox passwords or cookies 11->98 19 7cc5360128f822bc2ddf096d63fe8e2d.exe 4 5 11->19         started        22 7cc5360128f822bc2ddf096d63fe8e2d.exe 11->22         started        100 Injects a PE file into a foreign processes 15->100 24 remcos.exe 15->24         started        26 remcos.exe 15->26         started        28 remcos.exe 15->28         started        30 remcos.exe 17->30         started        32 remcos.exe 17->32         started        signatures5 process6 file7 58 C:\Users\user\AppData\Roaming\...\remcos.exe, PE32 19->58 dropped 60 C:\Users\user\...\remcos.exe:Zone.Identifier, ASCII 19->60 dropped 34 wscript.exe 1 19->34         started        process8 process9 36 cmd.exe 1 34->36         started        process10 38 remcos.exe 3 36->38         started        42 conhost.exe 36->42         started        file11 62 C:\Users\user\AppData\...\remcos.exe.log, ASCII 38->62 dropped 84 Multi AV Scanner detection for dropped file 38->84 86 Machine Learning detection for dropped file 38->86 88 Contains functionality to steal Chrome passwords or cookies 38->88 90 3 other signatures 38->90 44 remcos.exe 3 3 38->44         started        signatures12 process13 dnsIp14 68 lovedaysde.duckdns.org 45.133.1.234, 3999, 49741, 49742 DEDIPATH-LLCUS Netherlands 44->68 102 Injects a PE file into a foreign processes 44->102 48 remcos.exe 44->48         started        51 remcos.exe 44->51         started        54 svchost.exe 44->54         started        56 2 other processes 44->56 signatures15 process16 dnsIp17 70 Tries to steal Instant Messenger accounts or passwords 48->70 72 Tries to steal Mail credentials (via file access) 48->72 66 192.168.2.1 unknown unknown 51->66 74 Tries to harvest and steal browser information (history, passwords, etc) 51->74 signatures18
Threat name:
ByteCode-MSIL.Trojan.Pwsx
Status:
Malicious
First seen:
2021-03-03 10:06:10 UTC
File Type:
PE (.Net Exe)
Extracted files:
16
AV detection:
26 of 46 (56.52%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos persistence rat spyware
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
NirSoft MailPassView
Nirsoft
Remcos
Malware Config
C2 Extraction:
lovedaysde.duckdns.org:3999
Unpacked files
SH256 hash:
7446fb28c3472d4b5a153455dacc34c6f70e63bb767f22a2c74996c82f61d48d
MD5 hash:
5dd897680dc7b1db863d5b066061bfd5
SHA1 hash:
49bdeb8ef97cb5d447db68f662cfd83d1597439c
Detections:
win_remcos_g0 win_remcos_auto
SH256 hash:
f8b5b51efedb3e87493ac2439473564603cc3059d57956f209a7310e311a1027
MD5 hash:
d66f89bf838fb52ed59d311a99aea214
SHA1 hash:
342525c4aabbb92abf51459081d34ed0f1cdc965
SH256 hash:
cd07e115488feadf911642b1a5cd11fcd4b1920164d4d54ce2df4c43ef199b0e
MD5 hash:
ccffc9e310446f4cd97774ddce0c1277
SHA1 hash:
1fe848ae4955b8907b4b87ca6c1f561e6d7eab48
SH256 hash:
34876c5bdba001a4dcedd74beb4c1cfb5742da353f9735a27f1e787a6339d60f
MD5 hash:
6d3777e2b864ec0c83cc14fc137941f6
SHA1 hash:
489140a2f2c39f530bdc6ca4ae91d2b117be7569
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_RemcosRAT
Author:abuse.ch
Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer
Author:ditekSHen
Description:detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:Parallax
Author:@bartblaze
Description:Identifies Parallax RAT.
Rule name:Remcos
Author:JPCERT/CC Incident Response Group
Description:detect Remcos in memory
Rule name:remcos_rat
Author:jeFF0Falltrades
Rule name:REMCOS_RAT_variants
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

Executable exe 34876c5bdba001a4dcedd74beb4c1cfb5742da353f9735a27f1e787a6339d60f

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments