MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 371d0e3219602c0fd7be91fac46b730e829f2733bd0527149f86e58d2c17d005. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 10


Intelligence 10 IOCs YARA 2 File information Comments

SHA256 hash: 371d0e3219602c0fd7be91fac46b730e829f2733bd0527149f86e58d2c17d005
SHA3-384 hash: dac854f43ffc4caa14de7f35d766896ca68b5a49ee2a8387a7d2ea717c1220941074d66eeaa5e15ec129ab6e25c00fc4
SHA1 hash: 2f8e31cbc4d08ecd7bceced462c5d2fe03f8fd33
MD5 hash: b7a730f51df6a5d1ffd7e2645c037410
humanhash: four-spaghetti-mango-november
File name:b7a730f51df6a5d1ffd7e2645c037410.exe
Download: download sample
Signature RemcosRAT
File size:4'313'088 bytes
First seen:2022-08-31 18:26:10 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 24b92ccf1e266e626a6cc7126f975fe5 (7 x RemcosRAT)
ssdeep 98304:+MKH6O75X+P23F/idfvHiW8gVEUww3G4FAiCEH/ML:+z7++1KdXiW8MnwF4ZC+
TLSH T1F816237392680215E5E9CC3ECA273EE135F613B7CE81A83969CB6CC56525490E317EE3
TrID 29.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
22.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
20.3% (.EXE) Win32 Executable (generic) (4505/5/1)
9.1% (.EXE) OS/2 Executable (generic) (2029/13)
9.0% (.EXE) Generic Win/DOS Executable (2002/3)
Reporter abuse_ch
Tags:exe RAT RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
347
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Setting a keyboard event handler
Creating a window
DNS request
Creating a file in the %temp% subdirectories
Creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware packed remcos virus
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
rans.spyw.evad.mine
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Adware.Amonetize
Status:
Malicious
First seen:
2022-08-31 14:03:30 UTC
File Type:
PE (Exe)
AV detection:
21 of 26 (80.77%)
Threat level:
  1/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Remcos
Unpacked files
SH256 hash:
f4920928f0837c9ae06e698588a4b5dcb1a61ddf6f1e86e563d6179f502e6e6b
MD5 hash:
b884e364a532d6494bc9f0ff53562fd1
SHA1 hash:
1eaec8d2d96661fae588bc4e31ef7db7efa1392a
SH256 hash:
371d0e3219602c0fd7be91fac46b730e829f2733bd0527149f86e58d2c17d005
MD5 hash:
b7a730f51df6a5d1ffd7e2645c037410
SHA1 hash:
2f8e31cbc4d08ecd7bceced462c5d2fe03f8fd33
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer
Author:ditekSHen
Description:detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Rule name:Remcos
Author:kevoreilly
Description:Remcos Payload

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

Executable exe 371d0e3219602c0fd7be91fac46b730e829f2733bd0527149f86e58d2c17d005

(this sample)

  
Delivery method
Distributed via web download

Comments