MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 477b9f95d01a38672655cf452657193fbd4e82a06ca769e041ad31da49a882fa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RemcosRAT
Vendor detections: 4
| SHA256 hash: | 477b9f95d01a38672655cf452657193fbd4e82a06ca769e041ad31da49a882fa |
|---|---|
| SHA3-384 hash: | 0dde82fd4711f0cc80aa63530a926590d291677bf6bbccf28359c75165df5fea7b36b3e4233a5156012462948f3a9d3b |
| SHA1 hash: | 5a88bebe1110c7ecfd00f03bac3261b50d641115 |
| MD5 hash: | 9b57244d14c82ad2f8f8a7e0349574c6 |
| humanhash: | oklahoma-pennsylvania-moon-north |
| File name: | d27f99fd71b6dc0dc7fbf0e8619d9c4f.exe |
| Download: | download sample |
| Signature | RemcosRAT |
| File size: | 126'976 bytes |
| First seen: | 2020-03-30 01:55:11 UTC |
| Last seen: | 2020-04-01 07:06:32 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 5f0c90c109d16124e83cb7a25caef54f (28 x RemcosRAT, 1 x FormBook, 1 x NetWire) |
| ssdeep | 3072:mlh1qaSs6IF9OK4b80S2Van4Va1cpcQjed5OzqhUWa:Ch1qn3IF9Obbj/a1cpcQjeHOzqhUW |
| Threatray | 773 similar samples on MalwareBazaar |
| TLSH | 3CC3F867F20B80A3D863027156507B72EEBCBC311A5D5157E7E8D8811DF588E902AAFF |
| Reporter | |
| Tags: | exe GuLoader nVpn RemcosRAT |
abuse_ch
Payload dropped by GuLoader from the following URL:https://onedrive.live.com/download?cid=CFD8E120D47DF1A4&resid=CFD8E120D47DF1A4%211130&authkey=AGogqJZgOxHGAfU
Intelligence
File Origin
# of uploads :
6
# of downloads :
93
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Gathering data
Threat name:
Win32.Trojan.Rescoms
Status:
Malicious
First seen:
2020-03-30 02:35:27 UTC
File Type:
PE (Exe)
Extracted files:
2
AV detection:
29 of 31 (93.55%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
remcos
Similar samples:
+ 763 additional samples on MalwareBazaar
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
879636a1ac6ab1632360efcc8a0bf9a3eb06e79ede755d9b16202c684c3f8075
Dropped by
MD5 d27f99fd71b6dc0dc7fbf0e8619d9c4f
Dropped by
MD5 19d3e863d5297e39678b946a2e3f0b5e
Dropped by
GuLoader
Dropped by
SHA256 879636a1ac6ab1632360efcc8a0bf9a3eb06e79ede755d9b16202c684c3f8075
Dropped by
SHA256 625d4c3e6fd48112880eeed6c0628aa5daed0371c9d3dfc1ce5bb8430b78c78f
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| GDI_PLUS_API | Interfaces with Graphics | gdiplus.dll::GdiplusStartup gdiplus.dll::GdipGetImageEncoders gdiplus.dll::GdipGetImageEncodersSize gdiplus.dll::GdipAlloc |
| MULTIMEDIA_API | Can Play Multimedia | WINMM.dll::mciSendStringA WINMM.dll::mciSendStringW WINMM.dll::PlaySoundW WINMM.dll::waveInAddBuffer WINMM.dll::waveInClose WINMM.dll::waveInOpen |
| SECURITY_BASE_API | Uses Security Base API | ADVAPI32.dll::AdjustTokenPrivileges |
| SHELL_API | Manipulates System Shell | SHELL32.dll::ShellExecuteExA SHELL32.dll::ShellExecuteW |
| URL_MONIKERS_API | Can Download & Execute components | urlmon.dll::URLDownloadToFileW urlmon.dll::URLOpenBlockingStreamW |
| WIN32_PROCESS_API | Can Create Process and Threads | KERNEL32.dll::CreateProcessW KERNEL32.dll::CreateProcessA KERNEL32.dll::OpenProcess ADVAPI32.dll::OpenProcessToken KERNEL32.dll::VirtualAllocEx KERNEL32.dll::WriteProcessMemory |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess KERNEL32.dll::LoadLibraryA KERNEL32.dll::GetDriveTypeA KERNEL32.dll::GetStartupInfoA |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::AllocConsole |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CopyFileW KERNEL32.dll::CreateDirectoryW KERNEL32.dll::CreateFileMappingA KERNEL32.dll::CreateFileW KERNEL32.dll::DeleteFileA KERNEL32.dll::DeleteFileW |
| WIN_BASE_USER_API | Retrieves Account Information | ADVAPI32.dll::GetUserNameW ADVAPI32.dll::LookupPrivilegeValueA |
| WIN_REG_API | Can Manipulate Windows Registry | ADVAPI32.dll::RegCreateKeyA ADVAPI32.dll::RegCreateKeyW ADVAPI32.dll::RegCreateKeyExW ADVAPI32.dll::RegDeleteKeyA ADVAPI32.dll::RegOpenKeyExA ADVAPI32.dll::RegOpenKeyExW |
| WIN_SVC_API | Can Manipulate Windows Services | ADVAPI32.dll::ChangeServiceConfigW ADVAPI32.dll::ControlService ADVAPI32.dll::OpenSCManagerW ADVAPI32.dll::OpenSCManagerA ADVAPI32.dll::OpenServiceW ADVAPI32.dll::QueryServiceConfigW |
| WIN_USER_API | Performs GUI Actions | USER32.dll::AppendMenuA USER32.dll::EmptyClipboard USER32.dll::OpenClipboard USER32.dll::CreateWindowExA |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.COVID-19 malspam distributing GuLoader->RemcosRAT:
HELO: mta0.veresegyhaz.tk
Sending IP: 161.35.58.139
From: WHO<info@veresegyhaz.tk>
Subject: Re: COVID-19 Relief: How to Access Complimentary Products
Attachment: Covid-19.001 (contains "CHATTING.EXE")
GuLoader payload URL (RemcosRAT):
https://onedrive.live.com/download?cid=CFD8E120D47DF1A4&resid=CFD8E120D47DF1A4%211132&authkey=AFrU_0NCOPZWS7A
RemcosRAT C2:
91.193.75.126:2019
% Information related to '91.193.75.0 - 91.193.75.255'
% Abuse contact for '91.193.75.0 - 91.193.75.255' is 'abuse@kgb-vpn.org'
inetnum: 91.193.75.0 - 91.193.75.255
netname: NON-LOGGING-VPN-SERVICE
descr: Please note that we don't store any user data.
descr: Our main effort is not to make money, but to preserve values like the
descr: freedom of expression, the freedom of press, the right to data protection
descr: and informational self-determination.
descr: We ask all employees of Spamhaus and all self-proclaimed deputy sheriffs
descr: to stop your attacks against us.
country: EU