MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4f8e0185fbd30f92a58d1846b85105db4942fb932c10c57705e6ff1a856d804d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 9


Intelligence 9 IOCs YARA 12 File information Comments

SHA256 hash: 4f8e0185fbd30f92a58d1846b85105db4942fb932c10c57705e6ff1a856d804d
SHA3-384 hash: 135f8205a6e8bf596c950bb34cccb8798b578783c0389dca19e45f9150a5a4b258e5b1e8f17f2cd191925e387eed580a
SHA1 hash: bfba64c4d42ccd0c22409a9c2b72f72d68949d61
MD5 hash: 9ed17a3e5105ce4397d81965069ac0a8
humanhash: virginia-failed-victor-cat
File name:9ed17a3e5105ce4397d81965069ac0a8.exe
Download: download sample
Signature RemcosRAT
File size:1'768'744 bytes
First seen:2021-05-11 17:11:14 UTC
Last seen:2021-05-11 17:55:01 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'609 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 1536:DhBveHJO7ezqnZ/vIqXVGPKwlzlEtxO19eJgijxI0pti+nkH367BLy3dEkKCV4CL:Dh2EgFbL
Threatray 1'770 similar samples on MalwareBazaar
TLSH B685F3603EF3C11D72AE7A0F86F645E84973FB55BB7289DE395623510B8B581080AF4B
Reporter abuse_ch
Tags:exe RAT RemcosRAT signed

Code Signing Certificate

Organisation:uMJfBfb5mpF028e4j967v3f4Sbo22z516Y562cdbL592
Issuer:uMJfBfb5mpF028e4j967v3f4Sbo22z516Y562cdbL592
Algorithm:sha256WithRSAEncryption
Valid from:2021-05-11T11:30:35Z
Valid to:2022-05-11T11:30:35Z
Serial number: f08452d7af854a820726ca56c4711802
Thumbprint Algorithm:SHA256
Thumbprint: bc869075a13f747c1a867066609372355e2f64b14982a70408312537a05d1d5f
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
245
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Running batch commands
Creating a process with a hidden window
Launching a process
Adding an access-denied ACE
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Creating a file in the %temp% directory
Sending a UDP request
Launching the default Windows debugger (dwwin.exe)
Creating a process from a recently created file
Creating a window
Deleting a recently created file
DNS request
Connection attempt
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process by context flags manipulation
Setting a global event handler for the keyboard
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Contains functionality to capture and log keystrokes
Contains functionality to hide a thread from the debugger
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Country aware sample found (crashes after keyboard check)
Detected Remcos RAT
Found malware configuration
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: WScript or CScript Dropper
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 411298 Sample: sYUQok1WFO.exe Startdate: 11/05/2021 Architecture: WINDOWS Score: 100 82 Found malware configuration 2->82 84 Malicious sample detected (through community Yara rule) 2->84 86 Multi AV Scanner detection for submitted file 2->86 88 6 other signatures 2->88 11 sYUQok1WFO.exe 3 2->11         started        14 win.exe 2->14         started        16 win.exe 3 2->16         started        process3 signatures4 98 Contains functionality to steal Chrome passwords or cookies 11->98 100 Contains functionality to capture and log keystrokes 11->100 102 Contains functionality to inject code into remote processes 11->102 104 Contains functionality to steal Firefox passwords or cookies 11->104 18 sYUQok1WFO.exe 4 4 11->18         started        21 WerFault.exe 20 9 11->21         started        23 cmd.exe 1 11->23         started        106 Hides threads from debuggers 14->106 108 Injects a PE file into a foreign processes 14->108 25 cmd.exe 14->25         started        27 WerFault.exe 14->27         started        30 win.exe 14->30         started        32 cmd.exe 16->32         started        34 win.exe 16->34         started        36 WerFault.exe 16->36         started        process5 dnsIp6 70 C:\Users\user\AppData\Roaming\win.exe, PE32 18->70 dropped 72 C:\Users\user\...\win.exe:Zone.Identifier, ASCII 18->72 dropped 74 C:\Users\user\AppData\Local\...\install.vbs, data 18->74 dropped 38 wscript.exe 1 18->38         started        76 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 21->76 dropped 40 conhost.exe 23->40         started        42 timeout.exe 1 23->42         started        44 conhost.exe 25->44         started        46 timeout.exe 25->46         started        78 192.168.2.1 unknown unknown 27->78 48 conhost.exe 32->48         started        50 timeout.exe 32->50         started        file7 process8 process9 52 cmd.exe 1 38->52         started        process10 54 win.exe 3 52->54         started        57 conhost.exe 52->57         started        signatures11 90 Multi AV Scanner detection for dropped file 54->90 92 Machine Learning detection for dropped file 54->92 94 Hides threads from debuggers 54->94 96 2 other signatures 54->96 59 win.exe 54->59         started        62 cmd.exe 54->62         started        64 WerFault.exe 54->64         started        process12 dnsIp13 80 ghdyuienah123.freedynamicdns.org 46.243.248.86, 2006 M247GB Netherlands 59->80 66 conhost.exe 62->66         started        68 timeout.exe 62->68         started        process14
Threat name:
ByteCode-MSIL.Backdoor.Remcos
Status:
Malicious
First seen:
2021-05-11 11:46:08 UTC
File Type:
PE (.Net Exe)
Extracted files:
2
AV detection:
14 of 28 (50.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos persistence rat
Behaviour
Delays execution with timeout.exe
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
Remcos
Malware Config
C2 Extraction:
ghdyuienah123.freedynamicdns.org:2006
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_RemcosRAT
Author:abuse.ch
Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer
Author:ditekSHen
Description:detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFu
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:Parallax
Author:@bartblaze
Description:Identifies Parallax RAT.
Rule name:pe_imphash
Rule name:Remcos
Author:JPCERT/CC Incident Response Group
Description:detect Remcos in memory
Rule name:remcos_rat
Author:jeFF0Falltrades
Rule name:REMCOS_RAT_variants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemcosRAT

Executable exe 4f8e0185fbd30f92a58d1846b85105db4942fb932c10c57705e6ff1a856d804d

(this sample)

  
Delivery method
Distributed via web download

Comments