MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 43cc420597e97eb969e5fdc74282358168629f1c6ed9ddb385e000d17ec64a5a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RemcosRAT
Vendor detections: 9
| SHA256 hash: | 43cc420597e97eb969e5fdc74282358168629f1c6ed9ddb385e000d17ec64a5a |
|---|---|
| SHA3-384 hash: | 89199daf239e1c0246363e0d775ed7e08d2826e620111808a16cabb45b52c6d038bf2e40660c37a9ef294b0cf4474822 |
| SHA1 hash: | 9b3a4862ee021b35bf284640013b7679a0219946 |
| MD5 hash: | 82ccaeb12a02d7525eb54bbc12615078 |
| humanhash: | kilo-seven-friend-burger |
| File name: | Document.exe |
| Download: | download sample |
| Signature | RemcosRAT |
| File size: | 766'464 bytes |
| First seen: | 2021-09-01 18:20:35 UTC |
| Last seen: | 2021-09-05 08:58:36 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | ee4f103a4bbb8328057c2211d7594d0a (2 x RemcosRAT) |
| ssdeep | 12288:uEkuPF5S618CS6qkVdQOHvDc9aGKqa/ykXKQcj2SKI:uE/HS61uyswGKqXkzcR |
| Threatray | 945 similar samples on MalwareBazaar |
| TLSH | T1FAF47C15E7D1CCBEE0A528B45C6F63688C3CBD923E28549A1EE43D6C9F3E6E11714227 |
| dhash icon | daebe9240804a462 (7 x RemcosRAT, 1 x Formbook, 1 x AveMariaRAT) |
| Reporter | |
| Tags: | exe RemcosRAT |
Intelligence
File Origin
# of uploads :
2
# of downloads :
207
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Document.exe
Verdict:
Malicious activity
Analysis date:
2021-09-01 18:22:33 UTC
Tags:
rat remcos keylogger
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Sending a UDP request
DNS request
Connection attempt
Sending a custom TCP request
Creating a file
Deleting a recently created file
Launching a process
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Creating a file in the %AppData% subdirectories
Unauthorized injection to a system process
Verdict:
Malicious
Result
Threat name:
Remcos
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Creates a thread in another existing process (thread injection)
Delayed program exit found
Detected Remcos RAT
Found malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Uses dynamic DNS services
Writes to foreign memory regions
Yara detected Remcos RAT
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Zusy
Status:
Malicious
First seen:
2021-09-01 18:21:05 UTC
AV detection:
13 of 28 (46.43%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
remcos
Similar samples:
+ 935 additional samples on MalwareBazaar
Result
Malware family:
remcos
Score:
10/10
Tags:
family:remcos botnet:remotehost rat
Behaviour
Modifies registry key
Suspicious use of WriteProcessMemory
Remcos
Malware Config
C2 Extraction:
lindron.ddns.net:2404
lindron1.ddns.net:2404
lindron2.ddns.net:2404
lindron1.ddns.net:2404
lindron2.ddns.net:2404
Unpacked files
SH256 hash:
99b0762d826eceabff965fd4236f6c5770f87806045f6bb82fb7a30e1bdd6092
MD5 hash:
4aeeced1cdeff63c6eba363b22e2cbd6
SHA1 hash:
3fc45edb48b1a105c2285e826ab5ffc68f8adcca
SH256 hash:
4e1202f3e7e04b0b3ca1df164bf5381f24063c142317e774d4e5d88b2b3ac744
MD5 hash:
aa23dee2c34813d67fe9c67ec784782a
SHA1 hash:
10b2e7af7cb9d6f852e6d607875a8c9613538930
SH256 hash:
43cc420597e97eb969e5fdc74282358168629f1c6ed9ddb385e000d17ec64a5a
MD5 hash:
82ccaeb12a02d7525eb54bbc12615078
SHA1 hash:
9b3a4862ee021b35bf284640013b7679a0219946
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropped by
RemcosRAT
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.