MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 3a6558baa19564bc64f9054329de0f2575b6e2b8ea850d59d2646a6c048401ba. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RemcosRAT
Vendor detections: 14
| SHA256 hash: | 3a6558baa19564bc64f9054329de0f2575b6e2b8ea850d59d2646a6c048401ba |
|---|---|
| SHA3-384 hash: | e5ef22bee167735104091111ce6ac2ceb9f7c574b0a7dc6bf4f1a050c3d31cef1df0ccbfb9a42600a9be239c20970e6a |
| SHA1 hash: | 56c5460d5e3575b1a16a0672e63ee7f6cce2d086 |
| MD5 hash: | 6b4f80f373aab6c633f88399df306239 |
| humanhash: | fruit-apart-ohio-minnesota |
| File name: | 3a6558baa19564bc64f9054329de0f2575b6e2b8ea850d59d2646a6c048401ba |
| Download: | download sample |
| Signature | RemcosRAT |
| File size: | 1'212'832 bytes |
| First seen: | 2021-08-30 07:05:39 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | afcdf79be1557326c854b6e20cb900a7 (1'102 x FormBook, 936 x AgentTesla, 399 x RemcosRAT) |
| ssdeep | 24576:YEfUzt0WsNtypnSHZNTZ5kB3z0mHaYfltT5Uf1tE:LUztHpS55C3QYaClnG1a |
| Threatray | 1'923 similar samples on MalwareBazaar |
| TLSH | T1AB459E0273919026FEAE92734B55A2415678F8297023CC3F12BBDF786B701621E7D66F |
| dhash icon | 4be5c74fbfbd3bb7 (29 x RemcosRAT) |
| Reporter | |
| Tags: | exe RemcosRAT |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | ach_RemcosRAT |
|---|---|
| Author: | abuse.ch |
| Rule name: | AutoIT_Compiled |
|---|---|
| Author: | @bartblaze |
| Description: | Identifies compiled AutoIT script (as EXE). |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer |
|---|---|
| Author: | ditekSHen |
| Description: | detects Windows exceutables potentially bypassing UAC using eventvwr.exe |
| Rule name: | Parallax |
|---|---|
| Author: | @bartblaze |
| Description: | Identifies Parallax RAT. |
| Rule name: | Remcos |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Remcos in memory |
| Rule name: | remcos_rat |
|---|---|
| Author: | jeFF0Falltrades |
| Rule name: | REMCOS_RAT_variants |
|---|
| Rule name: | win_remcos_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.remcos. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.