MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4fbb3bf81fa5622f4640afa65fcaa18cbf88da23e6018bda7d068408e9409c8a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 15


Intelligence 15 IOCs YARA 3 File information Comments

SHA256 hash: 4fbb3bf81fa5622f4640afa65fcaa18cbf88da23e6018bda7d068408e9409c8a
SHA3-384 hash: f7f5197bb5bda59df7bf007a250e2576e196e384cc4e976199f8c8821f803d58182b2dfee79cc92ac6608f9c40c834ed
SHA1 hash: 58bda2ce0b78940851a1d957b0540109e345dc2e
MD5 hash: e9645995e5cbfbfdee6affbc4b7ab754
humanhash: saturn-quiet-leopard-fix
File name:709476 APL-794690470 ORDER807.exe
Download: download sample
Signature RemcosRAT
File size:1'266'688 bytes
First seen:2023-05-10 13:20:58 UTC
Last seen:2023-05-15 10:22:27 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'650 x AgentTesla, 19'462 x Formbook, 12'203 x SnakeKeylogger)
ssdeep 24576:szv6Lk8GWJV5XGe/XT+G0DkL+0x43l99TtXlpL:szvmkQjGqT+G0DkLMBT1lp
Threatray 2'239 similar samples on MalwareBazaar
TLSH T1CD45ADAC320074AFCB07CA7B8A681C64AA343566AF0BD117A16F15DCDE0DA93DF155E3
TrID 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
9.7% (.EXE) Win64 Executable (generic) (10523/12/4)
6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.1% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter James_inthe_box
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
267
Origin country :
US US
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
709476 APL-794690470 ORDER807.exe
Verdict:
Malicious activity
Analysis date:
2023-05-10 13:23:23 UTC
Tags:
rat remcos

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sample uses string decryption to hide its real strings
Sigma detected: Remcos
Sigma detected: Scheduled temp file as task from temp location
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 863044 Sample: 709476_APL-794690470_ORDER807.exe Startdate: 10/05/2023 Architecture: WINDOWS Score: 100 64 Found malware configuration 2->64 66 Malicious sample detected (through community Yara rule) 2->66 68 Antivirus detection for URL or domain 2->68 70 10 other signatures 2->70 8 709476_APL-794690470_ORDER807.exe 6 2->8         started        12 gjXVvTNSLrqH.exe 2 2->12         started        14 remcos.exe 2->14         started        16 2 other processes 2->16 process3 file4 50 C:\Users\user\AppData\...\gjXVvTNSLrqH.exe, PE32 8->50 dropped 52 C:\Users\...\gjXVvTNSLrqH.exe:Zone.Identifier, ASCII 8->52 dropped 54 C:\Users\user\AppData\Local\...\tmp8FF3.tmp, XML 8->54 dropped 72 Detected unpacking (changes PE section rights) 8->72 74 Detected unpacking (overwrites its own PE header) 8->74 76 Uses schtasks.exe or at.exe to add and modify task schedules 8->76 78 Adds a directory exclusion to Windows Defender 8->78 18 709476_APL-794690470_ORDER807.exe 2 4 8->18         started        21 powershell.exe 21 8->21         started        23 powershell.exe 21 8->23         started        31 2 other processes 8->31 80 Antivirus detection for dropped file 12->80 82 Multi AV Scanner detection for dropped file 12->82 84 Machine Learning detection for dropped file 12->84 86 Injects a PE file into a foreign processes 14->86 25 remcos.exe 14->25         started        29 schtasks.exe 14->29         started        signatures5 process6 dnsIp7 46 C:\ProgramData\Remcos\remcos.exe, PE32 18->46 dropped 48 C:\ProgramData\...\remcos.exe:Zone.Identifier, ASCII 18->48 dropped 33 remcos.exe 2 18->33         started        36 conhost.exe 21->36         started        38 conhost.exe 23->38         started        56 212.193.30.230, 3330 SPD-NETTR Russian Federation 25->56 88 Installs a global keyboard hook 25->88 40 conhost.exe 29->40         started        42 conhost.exe 31->42         started        file8 signatures9 process10 signatures11 58 Antivirus detection for dropped file 33->58 60 Multi AV Scanner detection for dropped file 33->60 62 Machine Learning detection for dropped file 33->62 44 conhost.exe 36->44         started        process12
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2023-05-10 13:19:30 UTC
File Type:
PE (.Net Exe)
Extracted files:
13
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:remotehost collection persistence rat spyware stealer
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses Microsoft Outlook accounts
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
NirSoft MailPassView
NirSoft WebBrowserPassView
Nirsoft
Remcos
Malware Config
C2 Extraction:
212.193.30.230:3330
Unpacked files
SH256 hash:
cb713c0c90497ffe320d3e946a079bd258ae2cb1dfddd7f13f1d94591e33308b
MD5 hash:
f1c779d7dd9573f423b2d6f19e98591e
SHA1 hash:
fec0951202b76f98d00cd7203b31b22e676d4f3f
SH256 hash:
437a5fd3553ce06cabff07cfd51f02fe8c913b32acfe0897eb541f4e10647c69
MD5 hash:
0e456a13ed56a5f9789f73f7911f2539
SHA1 hash:
34f13f60d58ed19d95262c47294fcef9121b2cdc
SH256 hash:
d8fc5dfdf2800247eb610beb076fec4d2becf6d951e89445d43237fe97814218
MD5 hash:
e5d93dadd08b8bc727e4f4853c6881ba
SHA1 hash:
27e0e057d33f01586193b0cbf06561c2863951f4
SH256 hash:
1e1bd80cadec42f9e16e0123a5e80f0f9fbaf7a824ff2fc2a809b9118ac759f2
MD5 hash:
8acb349337db9986145bb5bed748ffad
SHA1 hash:
d0c3d8602fff41f7276cc5132c321afd9d05bcd1
SH256 hash:
4fbb3bf81fa5622f4640afa65fcaa18cbf88da23e6018bda7d068408e9409c8a
MD5 hash:
e9645995e5cbfbfdee6affbc4b7ab754
SHA1 hash:
58bda2ce0b78940851a1d957b0540109e345dc2e
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments