MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 43cc420597e97eb969e5fdc74282358168629f1c6ed9ddb385e000d17ec64a5a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 43cc420597e97eb969e5fdc74282358168629f1c6ed9ddb385e000d17ec64a5a
SHA3-384 hash: 89199daf239e1c0246363e0d775ed7e08d2826e620111808a16cabb45b52c6d038bf2e40660c37a9ef294b0cf4474822
SHA1 hash: 9b3a4862ee021b35bf284640013b7679a0219946
MD5 hash: 82ccaeb12a02d7525eb54bbc12615078
humanhash: kilo-seven-friend-burger
File name:Document.exe
Download: download sample
Signature RemcosRAT
File size:766'464 bytes
First seen:2021-09-01 18:20:35 UTC
Last seen:2021-09-05 08:58:36 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash ee4f103a4bbb8328057c2211d7594d0a (2 x RemcosRAT)
ssdeep 12288:uEkuPF5S618CS6qkVdQOHvDc9aGKqa/ykXKQcj2SKI:uE/HS61uyswGKqXkzcR
Threatray 945 similar samples on MalwareBazaar
TLSH T1FAF47C15E7D1CCBEE0A528B45C6F63688C3CBD923E28549A1EE43D6C9F3E6E11714227
dhash icon daebe9240804a462 (7 x RemcosRAT, 1 x Formbook, 1 x AveMariaRAT)
Reporter GovCERT_CH
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
207
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Document.exe
Verdict:
Malicious activity
Analysis date:
2021-09-01 18:22:33 UTC
Tags:
rat remcos keylogger

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
DNS request
Connection attempt
Sending a custom TCP request
Creating a file
Deleting a recently created file
Launching a process
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Creating a file in the %AppData% subdirectories
Unauthorized injection to a system process
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Creates a thread in another existing process (thread injection)
Delayed program exit found
Detected Remcos RAT
Found malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Uses dynamic DNS services
Writes to foreign memory regions
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 476014 Sample: Document.exe Startdate: 01/09/2021 Architecture: WINDOWS Score: 100 40 Found malware configuration 2->40 42 Malicious sample detected (through community Yara rule) 2->42 44 Detected Remcos RAT 2->44 46 5 other signatures 2->46 8 Document.exe 20 2->8         started        process3 dnsIp4 32 phcprg.dm.files.1drv.com 8->32 34 onedrive.live.com 8->34 36 dm-files.fe.1drv.com 8->36 48 Writes to foreign memory regions 8->48 50 Creates a thread in another existing process (thread injection) 8->50 52 Injects a PE file into a foreign processes 8->52 12 secinit.exe 2 2 8->12         started        16 cmd.exe 1 8->16         started        18 cmd.exe 1 8->18         started        signatures5 process6 dnsIp7 38 lindron.ddns.net 193.187.90.38, 2404, 49719 OBE-EUROPEObenetworkEuropeSE Sweden 12->38 54 Contains functionality to steal Chrome passwords or cookies 12->54 56 Contains functionality to inject code into remote processes 12->56 58 Contains functionality to steal Firefox passwords or cookies 12->58 60 Delayed program exit found 12->60 20 reg.exe 1 16->20         started        22 conhost.exe 16->22         started        24 cmd.exe 1 18->24         started        26 conhost.exe 18->26         started        signatures8 process9 process10 28 conhost.exe 20->28         started        30 conhost.exe 24->30         started       
Threat name:
Win32.Trojan.Zusy
Status:
Malicious
First seen:
2021-09-01 18:21:05 UTC
AV detection:
13 of 28 (46.43%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:remotehost rat
Behaviour
Modifies registry key
Suspicious use of WriteProcessMemory
Remcos
Malware Config
C2 Extraction:
lindron.ddns.net:2404
lindron1.ddns.net:2404
lindron2.ddns.net:2404
Unpacked files
SH256 hash:
99b0762d826eceabff965fd4236f6c5770f87806045f6bb82fb7a30e1bdd6092
MD5 hash:
4aeeced1cdeff63c6eba363b22e2cbd6
SHA1 hash:
3fc45edb48b1a105c2285e826ab5ffc68f8adcca
SH256 hash:
4e1202f3e7e04b0b3ca1df164bf5381f24063c142317e774d4e5d88b2b3ac744
MD5 hash:
aa23dee2c34813d67fe9c67ec784782a
SHA1 hash:
10b2e7af7cb9d6f852e6d607875a8c9613538930
SH256 hash:
43cc420597e97eb969e5fdc74282358168629f1c6ed9ddb385e000d17ec64a5a
MD5 hash:
82ccaeb12a02d7525eb54bbc12615078
SHA1 hash:
9b3a4862ee021b35bf284640013b7679a0219946
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

Executable exe 43cc420597e97eb969e5fdc74282358168629f1c6ed9ddb385e000d17ec64a5a

(this sample)

  
Dropped by
RemcosRAT
  
Delivery method
Distributed via e-mail attachment

Comments