MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4cce5506593907c3db78282849ed41729ca7cf737e1d38cb82dc10e27d92ff16. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 18


Intelligence 18 IOCs YARA 25 File information Comments

SHA256 hash: 4cce5506593907c3db78282849ed41729ca7cf737e1d38cb82dc10e27d92ff16
SHA3-384 hash: 49e6633f0280793d30c7d16ae7a447015bebc3023526a7f5b745b264d3593222c3623b95ca0dee8bc7c0a9e044ed49b0
SHA1 hash: 8d6518f2ea260d9835c3ed7190808fc263ed010a
MD5 hash: 88ad99bd08e94b721914d8368c3a259b
humanhash: lake-don-blossom-oxygen
File name:J-230512-31246_-_111553_-_31246.pif.exe
Download: download sample
Signature RemcosRAT
File size:902'656 bytes
First seen:2026-05-21 14:16:17 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'991 x AgentTesla, 19'898 x Formbook, 12'331 x SnakeKeylogger)
ssdeep 24576:qQ/EymH4hro8jGqj56ulEJ8v+FgFOfY823:3yHGrhGqdFlECv+CX
Threatray 1'448 similar samples on MalwareBazaar
TLSH T18E1523E2A199E407E9861BF00932E3751775AE4CA517E323FED93DF73852F2424482C9
TrID 73.9% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
6.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.6% (.EXE) Win64 Executable (generic) (6522/11/2)
4.5% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter TomU
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
52
Origin country :
CH CH
Vendor Threat Intelligence
Malware configuration found for:
Remcos RoboSki
Details
Remcos
a version number and verbose configuration settings
RoboSki
a decrypted ReZer0 component and possibly a decryption component
RoboSki
a Base64 + XOR/Sub-decrypted component, its associated key, a mutex, a filename, and ReZer0 configuration parameters including: a load type, a download URL and filename (if configured), an interval (if configured), and varying flags
Malware family:
ID:
1
File name:
mensajes.zip
Verdict:
Malicious activity
Analysis date:
2024-09-27 06:41:39 UTC
Tags:
attachments attc-unc rat remcos evasion exfiltration smtp stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
infosteal remcos
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Creating a process with a hidden window
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a file in the %temp% directory
Launching a process
Creating a file
Sending a custom TCP request
Forced shutdown of a system process
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
masquerade packed remcos snakekeylogger
Verdict:
Malicious
File Type:
exe x32
First seen:
2024-09-19T03:39:00Z UTC
Last seen:
2026-05-22T00:02:00Z UTC
Hits:
~1000
Gathering data
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2024-09-19 10:07:06 UTC
File Type:
PE (.Net Exe)
Extracted files:
6
AV detection:
22 of 24 (91.67%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:remotehost discovery execution persistence rat
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
SmartAssembly .NET packer
Suspicious use of SetThreadContext
Checks computer location settings
Executes dropped EXE
Uses the VBS compiler for execution
Command and Scripting Interpreter: PowerShell
Family: Remcos
Malware Config
C2 Extraction:
www.drechftankholding.com:2404
Unpacked files
SH256 hash:
4cce5506593907c3db78282849ed41729ca7cf737e1d38cb82dc10e27d92ff16
MD5 hash:
88ad99bd08e94b721914d8368c3a259b
SHA1 hash:
8d6518f2ea260d9835c3ed7190808fc263ed010a
SH256 hash:
879276b0a6a9ed9a14ea05450f75ad6c254a78ba99b7b7292ae39b8aca4abfad
MD5 hash:
a89de4f61bef32a2d8bfbcb15b283f7d
SHA1 hash:
3149a37d44cf5d77045ea86a1f53897b7e93f299
Detections:
win_remcos_auto win_remcos_w0 Remcos
SH256 hash:
2e687df518f40f4eff2493062bfa9815f5913b0b08460d0da9eb1923c7ee591a
MD5 hash:
a9d7ac113f71d42a6a592af5038fcd9f
SHA1 hash:
df5df12d3938527419ce9046d2d413301f330862
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BLOWFISH_Constants
Author:phoul (@phoul)
Description:Look for Blowfish constants
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:iexplorer_remcos
Author:iam-py-test
Description:Detect iexplorer being taken over by Remcos
Rule name:INDICATOR_EXE_Packed_MPress
Author:ditekSHen
Description:Detects executables built or packed with MPress PE compressor
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Author:ditekSHen
Description:Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM
Author:ditekSHen
Description:Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:NET
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:pe_imphash
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:Remcos
Author:kevoreilly
Description:Remcos Payload
Rule name:REMCOS_RAT_variants
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:TeslaCryptPackedMalware
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Windows_Trojan_Remcos_b296e965
Author:Elastic Security
Reference:https://www.elastic.co/security-labs/exploring-the-ref2731-intrusion-set
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.remcos.
Rule name:win_remcos_w0
Author:Matthew @ Embee_Research
Description:Detects strings present in remcos rat Samples.
Rule name:yarahub_win_remcos_rat_unpacked_aug_2023
Author:Matthew @ Embee_Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

Executable exe 4cce5506593907c3db78282849ed41729ca7cf737e1d38cb82dc10e27d92ff16

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments