MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 452daf183846078dffb7fb5595860656cbff08f53bf710dd33c17590e2f13177. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 6


Intelligence 6 IOCs YARA 3 File information Comments

SHA256 hash: 452daf183846078dffb7fb5595860656cbff08f53bf710dd33c17590e2f13177
SHA3-384 hash: cfaa0de96608219e86787cf56c8df59f2d2c86c6b858352de7f0718a7977cdfa3222b2e69120000ce98befb21c8bfbe0
SHA1 hash: 54395ce9dc76b798b9052c33e2c92184832a2e75
MD5 hash: 4be1bc0d4811a66a056fd6fe84205134
humanhash: comet-orange-six-fanta
File name:452daf183846078dffb7fb5595860656cbff08f53bf710dd33c17590e2f13177
Download: download sample
Signature RemcosRAT
File size:1'310'720 bytes
First seen:2020-11-13 15:39:06 UTC
Last seen:2024-07-24 13:41:21 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 8c1206cb36a00551135959c1e7294be4 (2 x RemcosRAT)
ssdeep 24576:P7HUgE+h6PyUHQB+3F3bNXEBJO85qUmAYz4bUPBrXNbBbjL:/B6PyUH3LGm6FXkr9bl
Threatray 1'352 similar samples on MalwareBazaar
TLSH 6F555B227DAE8877C0762A388D9FA6A96439BE113924855F77F01D0CCF367807C1939B
Reporter seifreed
Tags:RemcosRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
57
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a window
Launching a process
Transferring files using the Background Intelligent Transfer Service (BITS)
DNS request
Sending a custom TCP request
Creating a file in the %temp% directory
Deleting a recently created file
Unauthorized injection to a system process
Forced shutdown of a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Backdoor.Remcos
Status:
Malicious
First seen:
2020-11-13 15:43:06 UTC
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Unpacked files
SH256 hash:
452daf183846078dffb7fb5595860656cbff08f53bf710dd33c17590e2f13177
MD5 hash:
4be1bc0d4811a66a056fd6fe84205134
SHA1 hash:
54395ce9dc76b798b9052c33e2c92184832a2e75
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:crime_win32_parallax_payload_1
Author:@VK_Intel
Description:Detects Parallax Injected Payload v1.01
Reference:https://twitter.com/VK_Intel/status/1227976106227224578
Rule name:crime_win32_rat_parralax_shell_bin
Author:@VK_Intel
Description:Detects Parallax injected code
Reference:https://twitter.com/VK_Intel/status/1257714191902937088
Rule name:MAL_crime_win32_rat_parallax_shell_bin
Author:@VK_Intel
Description:Detects Parallax injected code
Reference:https://twitter.com/VK_Intel/status/1257714191902937088

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments