MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 408d06eb0f8df445f72b771e26fac033f6a71f867d1bb5a1f78320e99b30d331. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 408d06eb0f8df445f72b771e26fac033f6a71f867d1bb5a1f78320e99b30d331
SHA3-384 hash: 591b904994efc35db7c64a0320047f241b8370a0127e393c91d8c1c0b3c17ae0e44fa191228ab5656eaae47f01132bae
SHA1 hash: b6ef1ce19a0c9574a5dd0d5b3a14f450ba416cb7
MD5 hash: a37511d884609f6667589a446a741a02
humanhash: beer-nevada-robert-white
File name:SATIN ALMA SIPARISI-34002174,pdf.exe
Download: download sample
Signature RemcosRAT
File size:933'888 bytes
First seen:2021-11-05 15:10:04 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 56b4814557e2e2739d9a5efb22e955d4 (3 x RemcosRAT, 1 x Formbook)
ssdeep 12288:zvY8dhGipM4Yld9SyATMUCAyo5qTThHokUflI+5MWBnsQfnEPV:T9b3O4YldFATMUR5eIv5PBlfK
TLSH T191157B619D4005F6F0631678B86BABB9ED317E502A0D99462DB67E4B0EF7382B370C47
File icon (PE):PE icon
dhash icon 697110152b2b1530 (9 x RemcosRAT, 6 x Formbook)
Reporter abuse_ch
Tags:exe RAT RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
149
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
keylogger
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Creates a thread in another existing process (thread injection)
Delayed program exit found
Detected Remcos RAT
Found malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Uses dynamic DNS services
Writes to foreign memory regions
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 516584 Sample: SATIN ALMA SIPARISI-3400217... Startdate: 05/11/2021 Architecture: WINDOWS Score: 100 44 blessedmacatty.ddns.net 2->44 62 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->62 64 Found malware configuration 2->64 66 Malicious sample detected (through community Yara rule) 2->66 68 5 other signatures 2->68 9 SATIN ALMA SIPARISI-34002174,pdf.exe 1 22 2->9         started        14 Xektgori.exe 15 2->14         started        16 Xektgori.exe 15 2->16         started        signatures3 process4 dnsIp5 48 onedrive.live.com 9->48 50 nc14fa.dm.files.1drv.com 9->50 52 dm-files.fe.1drv.com 9->52 42 C:\Users\Public\Libraries\...\Xektgori.exe, PE32 9->42 dropped 78 Writes to foreign memory regions 9->78 80 Creates a thread in another existing process (thread injection) 9->80 82 Injects a PE file into a foreign processes 9->82 18 logagent.exe 2 9->18         started        22 cmd.exe 1 9->22         started        24 cmd.exe 1 9->24         started        54 onedrive.live.com 14->54 58 2 other IPs or domains 14->58 84 Antivirus detection for dropped file 14->84 86 Multi AV Scanner detection for dropped file 14->86 26 logagent.exe 14->26         started        56 onedrive.live.com 16->56 60 2 other IPs or domains 16->60 28 logagent.exe 16->28         started        file6 signatures7 process8 dnsIp9 46 blessedmacatty.ddns.net 185.140.53.10, 2091, 49750, 49765 DAVID_CRAIGGG Sweden 18->46 70 Contains functionality to steal Chrome passwords or cookies 18->70 72 Contains functionality to capture and log keystrokes 18->72 74 Contains functionality to inject code into remote processes 18->74 76 2 other signatures 18->76 30 reg.exe 1 22->30         started        32 conhost.exe 22->32         started        34 cmd.exe 1 24->34         started        36 conhost.exe 24->36         started        signatures10 process11 process12 38 conhost.exe 30->38         started        40 conhost.exe 34->40         started       
Threat name:
Win32.Backdoor.Remcos
Status:
Malicious
First seen:
2021-11-05 15:11:05 UTC
AV detection:
17 of 44 (38.64%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:kingmaca persistence rat suricata
Behaviour
Modifies registry key
Suspicious use of WriteProcessMemory
Adds Run key to start application
Remcos
suricata: ET MALWARE Remocs 3.x Unencrypted Checkin
suricata: ET MALWARE Remocs 3.x Unencrypted Server Response
Malware Config
C2 Extraction:
blessedmacatty.ddns.net:2091
Unpacked files
SH256 hash:
cfe5f920655e4401e4613a82cef8413815266e0d094b7191b798ef784d149600
MD5 hash:
9d1ba3d810ce45970beabe0420ced03f
SHA1 hash:
f43b98c221b3f8026b6533dc7573e43c4fe16bcd
SH256 hash:
f5649b067ccdd47a11b8ef7059fa60bca6ff45d21ad95faf50cad49783966353
MD5 hash:
b206e756c16294865166b6fd02bc8250
SHA1 hash:
02d5128565c7f92d6b72087c49daeb5027a83315
SH256 hash:
408d06eb0f8df445f72b771e26fac033f6a71f867d1bb5a1f78320e99b30d331
MD5 hash:
a37511d884609f6667589a446a741a02
SHA1 hash:
b6ef1ce19a0c9574a5dd0d5b3a14f450ba416cb7
Malware family:
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

Executable exe 408d06eb0f8df445f72b771e26fac033f6a71f867d1bb5a1f78320e99b30d331

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments