MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4e98af0f32aa268fa9ab8b1b1ee0acb26e16f4675369bc832ea1f79c2756d440. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 4e98af0f32aa268fa9ab8b1b1ee0acb26e16f4675369bc832ea1f79c2756d440
SHA3-384 hash: dd260f49471797f787bfc2141ba047f1ec4a4af2fff600d287721690ded24586a5fa67647e59e968349effeca5d95981
SHA1 hash: 3ef5b06c5234c75cf20695b930c54fdbba30a610
MD5 hash: 1a881d00cf7d86eb8d9eece454fe57d0
humanhash: five-king-video-alabama
File name:PO-567GH.js
Download: download sample
Signature RemcosRAT
File size:1'600 bytes
First seen:2025-03-24 12:15:21 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 24:KPrir+rMIS9rAer/r/rrrJMrprururrrqHrJMr/rIrNrIrIrurVprurKHryHrKHw:KS2MjN+m
Threatray 742 similar samples on MalwareBazaar
TLSH T15531A7204D439C28A7C199EC2B849D758274CBE02CD6DF676240BDC5AF176452D68DEB
Magika javascript
Reporter abuse_ch
Tags:js RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
402
Origin country :
NL NL
Vendor Threat Intelligence
Verdict:
Malicious
Score:
94.1%
Tags:
remcos virus agent sage
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
obfuscated
Result
Verdict:
MALICIOUS
Result
Threat name:
Detection:
malicious
Classification:
rans.phis.troj.spyw.expl.evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Script.Trojan.Generic
Status:
Suspicious
First seen:
2025-03-24 01:00:58 UTC
File Type:
Binary
AV detection:
5 of 24 (20.83%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:dukas collection discovery execution rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: JavaScript
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Accesses Microsoft Outlook accounts
Command and Scripting Interpreter: PowerShell
Checks computer location settings
Blocklisted process makes network request
Detected Nirsoft tools
NirSoft MailPassView
NirSoft WebBrowserPassView
Remcos
Remcos family
Malware Config
C2 Extraction:
dukasbecomeagreatpersonwhowantotbecomegreatnessfor.ydns.eu:14645
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments