MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 46f9b3a73b2ef17c7ace714e6b69b02e444096fb395d85e3b3220ed13d060a48. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 46f9b3a73b2ef17c7ace714e6b69b02e444096fb395d85e3b3220ed13d060a48
SHA3-384 hash: 3c917f6a0037ba5903ed27f88dfc0e35c7f93236aea84cf0ee2ef056ef1dae218664e3acf04a67c2778cb3e493585e50
SHA1 hash: 0f27e8e24c40de4df8d6f50634c7aba117679f7a
MD5 hash: 46580314ad41ee9c33eea70fd336f9d1
humanhash: diet-blossom-johnny-earth
File name:drivers_check.exe
Download: download sample
Signature RemcosRAT
File size:1'456'640 bytes
First seen:2021-01-01 18:47:50 UTC
Last seen:2021-01-01 20:42:19 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 6ec4d0cb36c27bab38f41ffb84797488 (1 x RemcosRAT)
ssdeep 24576:BiDA2fwduM0v4LHqHEwrk7TGuuuENtPoH+mWMXw1mpg1y:BiDsdqyauuuFHAIJa
Threatray 1'328 similar samples on MalwareBazaar
TLSH 6F653AD26DDD48FBC06A16344D1BA6A5552BFEBC3A2045DBA7E01C0CDB393C178352AB
Reporter o2genum
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
245
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
drivers_check.exe
Verdict:
Malicious activity
Analysis date:
2021-01-01 18:50:25 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Launching a process
Transferring files using the Background Intelligent Transfer Service (BITS)
DNS request
Sending a custom TCP request
Creating a file in the %temp% directory
Enabling the 'hidden' option for files in the %temp% directory
Moving a file to the %temp% directory
Launching cmd.exe command interpreter
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
60 / 100
Signature
Contains functionality to detect sleep reduction / modifications
Found potential dummy code loops (likely to delay analysis)
Hijacks the control flow in another process
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Writes to foreign memory regions
Behaviour
Behavior Graph:
Result
Malware family:
Score:
  10/10
Tags:
family:remcos rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Blocklisted process makes network request
Remcos
Malware Config
C2 Extraction:
5.61.56.10:9003
Unpacked files
SH256 hash:
46f9b3a73b2ef17c7ace714e6b69b02e444096fb395d85e3b3220ed13d060a48
MD5 hash:
46580314ad41ee9c33eea70fd336f9d1
SHA1 hash:
0f27e8e24c40de4df8d6f50634c7aba117679f7a
SH256 hash:
c7fbdc61eb62c05e40295617e2db75877672931f751a770d2629e6eab6075f2c
MD5 hash:
abf6c724b20844d5b0073988a58faf1e
SHA1 hash:
7a8269d5b2ae623f8148ce9863f48f7e12ce036b
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

Executable exe 46f9b3a73b2ef17c7ace714e6b69b02e444096fb395d85e3b3220ed13d060a48

(this sample)

Comments