MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4f745300cafa61916be7a4e403c593c3f399a179aa73593d8e5229577b64eee5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 17


Intelligence 17 IOCs YARA 2 File information Comments

SHA256 hash: 4f745300cafa61916be7a4e403c593c3f399a179aa73593d8e5229577b64eee5
SHA3-384 hash: 52f7b5746fb19f30c9dac9573db00a95a1cdb9e0085ac0feba158bcc28a5dd79bfa6e1451c39529a4b53b7731020eb84
SHA1 hash: 693e1c0b0ded1b2b1f315e33712375ee14615398
MD5 hash: 2af020a1f8b816811bacc9daa1278460
humanhash: oscar-harry-avocado-queen
File name:Bacteririum.exe
Download: download sample
Signature RemcosRAT
File size:1'559'183 bytes
First seen:2026-03-16 04:03:42 UTC
Last seen:2026-03-16 08:12:59 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 1f23f452093b5c1ff091a2f9fb4fa3e9 (294 x GuLoader, 46 x VIPKeylogger, 42 x RemcosRAT)
ssdeep 24576:+OGkNvBTMuRONBpKmPd160rRmXN+inxBDfVKNidehcVQuOmX93l9:5dviBpreESBbVmZ8Q6
Threatray 2'602 similar samples on MalwareBazaar
TLSH T14D7523D43A90D402C6780E72250BD73A594ABD132C27F247FAE60F9F742EAC6DD79249
TrID 50.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
10.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
10.5% (.EXE) Win64 Executable (generic) (6522/11/2)
8.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.2% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
Reporter threatcat_ch
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
3
# of downloads :
205
Origin country :
CH CH
Vendor Threat Intelligence
Malware configuration found for:
GuLoader NSIS
Details
GuLoader
a c2 URL, a useragent string, and a string XOR key
GuLoader
an XOR decryption key and an extracted component
NSIS
extracted archive contents
Malware family:
n/a
ID:
1
File name:
7fb5f072e78651b6ce8ed4a51066132f691ae42b395216dabb0a03848109576e.zip
Verdict:
Suspicious activity
Analysis date:
2026-03-16 03:37:54 UTC
Tags:
arch-exec

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
shellcode virus blic
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %AppData% subdirectories
Creating a file in the Program Files subdirectories
Delayed reading of the file
Sending a custom TCP request
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file in the %temp% directory
Creating a window
Creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
adaptive-context anti-debug fingerprint installer installer installer-heuristic microsoft_visual_cc nemesis nsis soft-404 unsafe
Verdict:
Malicious
File Type:
exe x32
Detections:
Trojan.NSIS.Makoob.sba HEUR:Trojan.Win32.Guloader.gen Trojan-Downloader.Win32.Minix.sb Trojan.Win32.Guloader.sb Trojan.Win32.Agent.sb Trojan.NSIS.Makoob.sbe
Result
Threat name:
GuLoader, Remcos
Detection:
malicious
Classification:
troj.evad.phis.spyw
Score:
100 / 100
Signature
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Creates autostart registry keys with suspicious names
Detected Remcos RAT
Found hidden mapped module (file has been removed from disk)
Found malware configuration
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Unusual module load detection (module proxying)
Writes to foreign memory regions
Yara detected GuLoader
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1884053 Sample: Bacteririum.exe Startdate: 16/03/2026 Architecture: WINDOWS Score: 100 69 drive.usercontent.google.com 2->69 71 drive.google.com 2->71 79 Suricata IDS alerts for network traffic 2->79 81 Found malware configuration 2->81 83 Antivirus detection for dropped file 2->83 85 6 other signatures 2->85 10 Bacteririum.exe 6 99 2->10         started        14 remcos.exe 2->14         started        16 remcos.exe 2->16         started        signatures3 process4 file5 63 C:\Users\user\AppData\Local\...\System.dll, PE32 10->63 dropped 97 Tries to detect virtualization through RDTSC time measurements 10->97 99 Unusual module load detection (module proxying) 10->99 101 Switches to a custom stack to bypass stack traces 10->101 18 Bacteririum.exe 2 10 10->18         started        23 Bacteririum.exe 10->23         started        65 C:\Users\user\AppData\Local\...\System.dll, PE32 14->65 dropped 25 remcos.exe 14->25         started        27 remcos.exe 14->27         started        signatures6 process7 dnsIp8 73 drive.usercontent.google.com 142.250.191.1, 443, 49710, 49713 GOOGLEUS United States 18->73 75 drive.google.com 142.251.41.174, 443, 49709, 49712 GOOGLEUS United States 18->75 53 C:\ProgramData\Remcos\remcos.exe, PE32 18->53 dropped 55 C:\ProgramData\...\remcos.exe:Zone.Identifier, ASCII 18->55 dropped 87 Detected Remcos RAT 18->87 89 Creates autostart registry keys with suspicious names 18->89 29 remcos.exe 39 18->29         started        33 Bacteririum.exe 18->33         started        35 remcos.exe 25->35         started        file9 signatures10 process11 file12 67 C:\Users\user\AppData\Local\...\System.dll, PE32 29->67 dropped 113 Multi AV Scanner detection for dropped file 29->113 115 Found hidden mapped module (file has been removed from disk) 29->115 117 Tries to detect virtualization through RDTSC time measurements 29->117 119 2 other signatures 29->119 37 remcos.exe 4 10 29->37         started        42 remcos.exe 29->42         started        signatures13 process14 dnsIp15 77 172.245.246.91, 2404, 49714, 49715 AS-COLOCROSSINGUS United States 37->77 57 C:\Users\user\AppData\Local\Temp\TH92DD.tmp, MS-DOS 37->57 dropped 59 C:\Users\user\AppData\Local\Temp\TH929E.tmp, MS-DOS 37->59 dropped 61 C:\Users\user\AppData\Local\Temp\TH926E.tmp, MS-DOS 37->61 dropped 91 Detected Remcos RAT 37->91 93 Writes to foreign memory regions 37->93 95 Maps a DLL or memory area into another process 37->95 44 userinit.exe 37->44         started        47 userinit.exe 37->47         started        49 userinit.exe 37->49         started        51 4 other processes 37->51 file16 signatures17 process18 signatures19 103 Tries to steal Mail credentials (via file registry) 44->103 105 Tries to harvest and steal browser information (history, passwords, etc) 44->105 107 Unusual module load detection (module proxying) 44->107 109 Tries to steal Instant Messenger accounts or passwords 47->109 111 Tries to steal Mail credentials (via file / registry access) 47->111
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
Executable NSIS Installer PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Malware.Nemesis
Status:
Malicious
First seen:
2026-03-16 02:53:10 UTC
File Type:
PE (Exe)
Extracted files:
55
AV detection:
6 of 38 (15.79%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:guloader family:remcos botnet:remotehost collection discovery downloader persistence rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Suspicious use of NtCreateThreadExHideFromDebugger
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses Microsoft Outlook accounts
Adds Run key to start application
Contacts third-party web service commonly abused for C2
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Detected Nirsoft tools
Guloader family
Guloader,Cloudeye
Remcos
Remcos family
Malware Config
C2 Extraction:
172.245.246.91:2404
Unpacked files
SH256 hash:
4f745300cafa61916be7a4e403c593c3f399a179aa73593d8e5229577b64eee5
MD5 hash:
2af020a1f8b816811bacc9daa1278460
SHA1 hash:
693e1c0b0ded1b2b1f315e33712375ee14615398
SH256 hash:
86c8ee210e6611383a634dcb8c60455063ddae3d7adccbeacf3adf7bf2a46676
MD5 hash:
d2e45dd852a659e11897df573832f381
SHA1 hash:
19990ee627c95b6c18d3b5c5f0ec5c24791d0af5
SH256 hash:
c2f405d7402f815d0c3fadd9a50f0bbbb1bab9aa38fe347823478a2587299448
MD5 hash:
9625d5b1754bc4ff29281d415d27a0fd
SHA1 hash:
80e85afc5cccd4c0a3775edbb90595a1a59f5ce0
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Detect_NSIS_Nullsoft_Installer
Author:Obscurity Labs LLC
Description:Detects NSIS installers by .ndata section + NSIS header string
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

Executable exe 4f745300cafa61916be7a4e403c593c3f399a179aa73593d8e5229577b64eee5

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments