MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4f4faefccd62720a0f4febe5da5b1bdba3c6a27325bccfc42d1b5642f10b7c6e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments

SHA256 hash: 4f4faefccd62720a0f4febe5da5b1bdba3c6a27325bccfc42d1b5642f10b7c6e
SHA3-384 hash: 3a0e4d2c204368d7606635f5a137245ebfb884d51e4684e9eb6e9e80224894cae0daf11e75b1f9a54f12d403cf67275b
SHA1 hash: 531d7cc55396d88714b3bbac8ef8ff30c56b6a9a
MD5 hash: 15a1f1430fe5243ee56343abe10ebf6f
humanhash: maryland-avocado-chicken-skylark
File name:23h2j3sdf89239df234hj4ssfjkdskfj234k24jk234k234k090sdf23hj.hta
Download: download sample
Signature RemcosRAT
File size:44'103 bytes
First seen:2026-01-27 14:35:29 UTC
Last seen:Never
File type:HTML Application (hta) hta
MIME type:text/html
ssdeep 96:unD9cPTcYZcAOcPd/ucCcv2ryzygOgbgSg4gJyzNgugfgmcgZgfoCHtfOWWo/wZ5:c9cPTcYZcAOcpucCcv2eT2VsfOWWooqM
Threatray 1 similar samples on MalwareBazaar
TLSH T1A313B562784798EA6AAE2098360B7CF0E6245B8BC3300F257D3C117167656FB7606B4A
Magika html
Reporter James_inthe_box
Tags:exe hta RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
146
Origin country :
US US
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
99.9%
Tags:
ransomware shell sage
Result
Verdict:
Malicious
File Type:
HTA File - Malicious
Payload URLs
URL
File name
http://107.174.33.60/31/sdf9898fd9g9323j32j4jdsjfj32jj23j3jhjjshdfjhj32jjsjdjsd.js
HTA File
Behaviour
BlacklistAPI detected
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
powershell powershell pterodo
Verdict:
Malicious
File Type:
html
First seen:
2026-01-27T11:49:00Z UTC
Last seen:
2026-01-27T23:44:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan.HTA.SAgent.gen
Gathering data
Threat name:
Script-WScript.Dropper.Electryon
Status:
Malicious
First seen:
2026-01-27 08:38:40 UTC
File Type:
Text (HTML)
Extracted files:
1
AV detection:
8 of 24 (33.33%)
Threat level:
  3/5
Verdict:
malicious
Label(s):
nirsoft remcos admintool_mailpassview
Similar samples:
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:jrm collection defense_evasion discovery execution rat
Behaviour
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: JavaScript
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Accesses Microsoft Outlook accounts
Command and Scripting Interpreter: PowerShell
Checks computer location settings
Badlisted process makes network request
Detected Nirsoft tools
NirSoft MailPassView
Process spawned unexpected child process
Remcos
Remcos family
Malware Config
C2 Extraction:
mismilahioluwadoam.duckdns.org:14643
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments