MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3ebf027f17e2ba9e5689a67df4f1375297e9f43d258ac0b781d6fb27305fd452. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 12


Intelligence 12 IOCs YARA 13 File information Comments

SHA256 hash: 3ebf027f17e2ba9e5689a67df4f1375297e9f43d258ac0b781d6fb27305fd452
SHA3-384 hash: 331c677ac75deec201948c583e54e341add951b0642844ee5760e528b178013c222791d18120654cc80011b82595749d
SHA1 hash: 84d12fe925213f334d01f4c9501cb593c39e82f5
MD5 hash: ad0fa1fbbc7c22ade1e56a530f8425bd
humanhash: crazy-indigo-kansas-illinois
File name:Factura Serfinanza_0975065870_6947500_191136433437276862847_8174211_83395420064529248_1443580329_pdf.exe
Download: download sample
Signature RemcosRAT
File size:2'835'456 bytes
First seen:2021-05-10 07:14:10 UTC
Last seen:2021-05-10 08:08:01 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'609 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 1536:t9yNkIMkEpkI4FAMG6SKbWYf4Jz29pXzzYtPBYXLNUnf1+sJSJZw0cRcKoYZtdZG:ztfqVLWc6Eblm9BFsYAyR+m+rn
Threatray 1'964 similar samples on MalwareBazaar
TLSH 42D5E9B9F66C117E507FA6E5A15CB1DC0EBFEB72D5B8128B530280534F693984B29323
Reporter abuse_ch
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
151
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Launching a service
Sending a UDP request
Deleting a recently created file
Launching a process
Creating a file in the %AppData% subdirectories
Enabling the 'hidden' option for recently created files
Creating a file
Creating a window
Running batch commands
DNS request
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process by context flags manipulation
Setting a global event handler for the keyboard
Connection attempt to an infection source
Adding exclusions to Windows Defender
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large strings
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Detected Remcos RAT
Found malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: WScript or CScript Dropper
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 411854 Sample: 0329_pdf.exe Startdate: 12/05/2021 Architecture: WINDOWS Score: 100 73 Multi AV Scanner detection for domain / URL 2->73 75 Found malware configuration 2->75 77 Malicious sample detected (through community Yara rule) 2->77 79 9 other signatures 2->79 11 0329_pdf.exe 6 7 2->11         started        15 PxxoServicesTrialNet1.exe 2->15         started        17 PxxoServicesTrialNet1.exe 2->17         started        process3 file4 61 C:\Users\user\AppData\...\0329_pdf.exe.log, ASCII 11->61 dropped 63 C:\Users\user\AppData\...\AdvancedRun.exe, PE32 11->63 dropped 81 Contains functionality to steal Chrome passwords or cookies 11->81 83 Contains functionality to capture and log keystrokes 11->83 85 Contains functionality to inject code into remote processes 11->85 87 Contains functionality to steal Firefox passwords or cookies 11->87 19 0329_pdf.exe 11->19         started        22 AdvancedRun.exe 1 11->22         started        25 powershell.exe 26 11->25         started        65 C:\Users\user\AppData\...\AdvancedRun.exe, PE32 15->65 dropped 89 Adds a directory exclusion to Windows Defender 15->89 91 Injects a PE file into a foreign processes 15->91 27 AdvancedRun.exe 15->27         started        29 powershell.exe 15->29         started        67 C:\Users\user\AppData\...\AdvancedRun.exe, PE32 17->67 dropped signatures5 process6 dnsIp7 55 C:\Users\user\...\PxxoServicesTrialNet1.exe, PE32 19->55 dropped 57 PxxoServicesTrialN...exe:Zone.Identifier, ASCII 19->57 dropped 59 C:\Users\user\AppData\Local\...\install.vbs, data 19->59 dropped 31 wscript.exe 19->31         started        71 192.168.2.1 unknown unknown 22->71 33 AdvancedRun.exe 22->33         started        35 conhost.exe 22->35         started        37 conhost.exe 25->37         started        39 AdvancedRun.exe 27->39         started        file8 process9 process10 41 cmd.exe 31->41         started        process11 43 PxxoServicesTrialNet1.exe 41->43         started        47 conhost.exe 41->47         started        file12 69 C:\Users\user\AppData\...\AdvancedRun.exe, PE32 43->69 dropped 93 Multi AV Scanner detection for dropped file 43->93 95 Machine Learning detection for dropped file 43->95 97 Adds a directory exclusion to Windows Defender 43->97 99 Injects a PE file into a foreign processes 43->99 49 AdvancedRun.exe 43->49         started        51 powershell.exe 43->51         started        signatures13 process14 process15 53 AdvancedRun.exe 49->53         started       
Threat name:
ByteCode-MSIL.Backdoor.Remcos
Status:
Malicious
First seen:
2021-05-10 07:14:21 UTC
AV detection:
9 of 47 (19.15%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos evasion persistence rat trojan
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Windows security modification
Executes dropped EXE
Nirsoft
Modifies Windows Defender Real-time Protection settings
Remcos
Turns off Windows Defender SpyNet reporting
Windows security bypass
Malware Config
C2 Extraction:
databasepropersonombrecomercialideasearchwords.services:3521
Unpacked files
SH256 hash:
ed8fb2ed9199d50c1303b01e17128771f7a8b70e0f29851504faadadf9a704a3
MD5 hash:
5013cfb31d9b62b4801ce8b6df38aa93
SHA1 hash:
c20e2b3552cd4d93d22448be98b8c30b98ecc3b5
Detections:
win_remcos_g0 win_remcos_auto
SH256 hash:
1390906ea2d6ddd94218070fe92b867ba60dd0bb0b1cd9ef2816bbd7b8d1a5d3
MD5 hash:
2fc5d8b90f77dc249758c5ed908cfe6e
SHA1 hash:
abe199c3df7528c89f0056006705211033601f7a
SH256 hash:
3da80bd8e18bf2ef5e28f5e2e0d2095b0d4e65391800ce18f9a18859d7beb220
MD5 hash:
5dbed7594d4c8d71c1882692e6776bf0
SHA1 hash:
8552a2f2afca501945fe57c1875970b6f777f709
SH256 hash:
3ebf027f17e2ba9e5689a67df4f1375297e9f43d258ac0b781d6fb27305fd452
MD5 hash:
ad0fa1fbbc7c22ade1e56a530f8425bd
SHA1 hash:
84d12fe925213f334d01f4c9501cb593c39e82f5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_RemcosRAT
Author:abuse.ch
Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer
Author:ditekSHen
Description:detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFu
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:Parallax
Author:@bartblaze
Description:Identifies Parallax RAT.
Rule name:pe_imphash
Rule name:Remcos
Author:JPCERT/CC Incident Response Group
Description:detect Remcos in memory
Rule name:remcos_rat
Author:jeFF0Falltrades
Rule name:REMCOS_RAT_variants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_remcos_g0
Author:Daniel Plohmann <daniel.plohmann<at>fkie.fraunhofer.de>

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments