MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 42460c32bf624fab49e385e8bb9efe77dc1f3c73ab82401fd072433268aa9ec5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RemcosRAT
Vendor detections: 13
| SHA256 hash: | 42460c32bf624fab49e385e8bb9efe77dc1f3c73ab82401fd072433268aa9ec5 |
|---|---|
| SHA3-384 hash: | 2acc211fb7b96f29c09026c629cbaf670305550229ede08d534c3bc749ae152b6ce1b6ba8c3e6eb4ba9bcd1204f0e753 |
| SHA1 hash: | f9f3d26d71a634df540111d69d55c7a180e9718d |
| MD5 hash: | 20721fa2a71b3826847d2c93b419fffb |
| humanhash: | alaska-johnny-wyoming-florida |
| File name: | FAZT987800090.exe |
| Download: | download sample |
| Signature | RemcosRAT |
| File size: | 1'349'632 bytes |
| First seen: | 2024-03-04 13:40:59 UTC |
| Last seen: | 2024-03-04 15:24:02 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 3d95adbf13bbe79dc24dccb401c12091 (881 x AgentTesla, 737 x FormBook, 236 x SnakeKeylogger) |
| ssdeep | 24576:Dtb20pkaCqT5TBWgNQ7aUplAEPliwF+yCb66zTgYyE6A:AVg5tQ7aURPliwwvb6yt5 |
| TLSH | T14355AD136F9DB260C26252737A55770DAE6B7C2D3EE1F45B2F9C393CE930121121AA63 |
| TrID | 68.8% (.CPL) Windows Control Panel Item (generic) (57583/11/19) 12.5% (.EXE) Win64 Executable (generic) (10523/12/4) 6.0% (.EXE) Win16 NE executable (generic) (5038/12/1) 5.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.4% (.EXE) OS/2 Executable (generic) (2029/13) |
| File icon (PE): | |
| dhash icon | 4c33d8d4d4d8324c (40 x AgentTesla, 23 x RedLineStealer, 15 x RemcosRAT) |
| Reporter | |
| Tags: | exe RemcosRAT |
Intelligence
File Origin
HUVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AutoIT_Compiled |
|---|---|
| Author: | @bartblaze |
| Description: | Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious. |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | YahLover |
|---|---|
| Author: | Kevin Falcoz |
| Description: | YahLover |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| AUTH_API | Manipulates User Authorization | ADVAPI32.dll::AllocateAndInitializeSid ADVAPI32.dll::CopySid ADVAPI32.dll::FreeSid ADVAPI32.dll::GetLengthSid ADVAPI32.dll::GetTokenInformation ADVAPI32.dll::GetAce |
| COM_BASE_API | Can Download & Execute components | ole32.dll::CLSIDFromProgID ole32.dll::CoCreateInstance ole32.dll::CoCreateInstanceEx ole32.dll::CoInitializeSecurity ole32.dll::CreateStreamOnHGlobal |
| MULTIMEDIA_API | Can Play Multimedia | WINMM.dll::mciSendStringW WINMM.dll::timeGetTime WINMM.dll::waveOutSetVolume |
| SECURITY_BASE_API | Uses Security Base API | ADVAPI32.dll::AddAce ADVAPI32.dll::AdjustTokenPrivileges ADVAPI32.dll::CheckTokenMembership ADVAPI32.dll::DuplicateTokenEx ADVAPI32.dll::GetAclInformation ADVAPI32.dll::GetSecurityDescriptorDacl |
| SHELL_API | Manipulates System Shell | SHELL32.dll::ShellExecuteExW SHELL32.dll::ShellExecuteW SHELL32.dll::SHFileOperationW |
| WIN32_PROCESS_API | Can Create Process and Threads | ADVAPI32.dll::CreateProcessAsUserW KERNEL32.dll::CreateProcessW ADVAPI32.dll::CreateProcessWithLogonW KERNEL32.dll::OpenProcess ADVAPI32.dll::OpenProcessToken ADVAPI32.dll::OpenThreadToken |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess KERNEL32.dll::SetSystemPowerState KERNEL32.dll::LoadLibraryA KERNEL32.dll::LoadLibraryExW KERNEL32.dll::LoadLibraryW KERNEL32.dll::GetDriveTypeW |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::WriteConsoleW KERNEL32.dll::ReadConsoleW KERNEL32.dll::SetStdHandle KERNEL32.dll::GetConsoleCP KERNEL32.dll::GetConsoleMode |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CopyFileW KERNEL32.dll::CreateDirectoryW KERNEL32.dll::CreateHardLinkW IPHLPAPI.DLL::IcmpCreateFile KERNEL32.dll::CreateFileW KERNEL32.dll::DeleteFileW |
| WIN_BASE_USER_API | Retrieves Account Information | KERNEL32.dll::GetComputerNameW ADVAPI32.dll::GetUserNameW ADVAPI32.dll::LogonUserW ADVAPI32.dll::LookupPrivilegeValueW |
| WIN_NETWORK_API | Supports Windows Networking | MPR.dll::WNetAddConnection2W MPR.dll::WNetUseConnectionW |
| WIN_REG_API | Can Manipulate Windows Registry | ADVAPI32.dll::RegConnectRegistryW ADVAPI32.dll::RegCreateKeyExW ADVAPI32.dll::RegDeleteKeyW ADVAPI32.dll::RegOpenKeyExW ADVAPI32.dll::RegQueryValueExW ADVAPI32.dll::RegSetValueExW |
| WIN_USER_API | Performs GUI Actions | USER32.dll::BlockInput USER32.dll::CloseDesktop USER32.dll::CreateMenu USER32.dll::EmptyClipboard USER32.dll::FindWindowExW USER32.dll::FindWindowW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.