MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4ff54bc771dc97403996794c50ded1a97b000c3f6eeff64afe3d049735e6bcdc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 16


Intelligence 16 IOCs YARA 3 File information Comments

SHA256 hash: 4ff54bc771dc97403996794c50ded1a97b000c3f6eeff64afe3d049735e6bcdc
SHA3-384 hash: 6986407efbdcd24ffcaa70dc28c1ba770ba6abe3f81481f6f8c8338fa1b32cd4325b8d19f32f9433b3f5f38ccec17cbe
SHA1 hash: 989d919493942e6da3809bf8c8c95945627797fe
MD5 hash: 62304ab9ea09befcc17d78857c685533
humanhash: four-juliet-lake-twenty
File name:SecuriteInfo.com.Win32.PWSX-gen.17695.8177
Download: download sample
Signature RemcosRAT
File size:883'712 bytes
First seen:2023-09-25 19:36:43 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'600 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 12288:RUgkR5725KtZs1L1fG+fzdX3mJwQlC6sDwhyxLU1KUT55/swI2J7Z3nFxecfSNcg:RUanF1e+bdXK1IegUbEwIoXmcB+yi1
Threatray 2'609 similar samples on MalwareBazaar
TLSH T10E15127D6C44417BC2F9C378C4E91A03F254656BB332EE56CAD71B8A1627A0379C272E
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter SecuriteInfoCom
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
314
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
SecuriteInfo.com.Win32.PWSX-gen.17695.8177
Verdict:
Malicious activity
Analysis date:
2023-09-25 19:38:56 UTC
Tags:
rat remcos keylogger

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Сreating synchronization primitives
Creating a process with a hidden window
Launching a process
Restart of the analyzed sample
Adding an exclusion to Microsoft Defender
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
masquerade packed remcos
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
rans.troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to bypass UAC (CMSTPLUA)
Contains functionality to modify clipboard data
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Found malware configuration
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Sigma detected: Scheduled temp file as task from temp location
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM3
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1314120 Sample: SecuriteInfo.com.Win32.PWSX... Startdate: 25/09/2023 Architecture: WINDOWS Score: 100 44 Found malware configuration 2->44 46 Malicious sample detected (through community Yara rule) 2->46 48 Antivirus detection for URL or domain 2->48 50 9 other signatures 2->50 7 afUoHw.exe 5 2->7         started        10 SecuriteInfo.com.Win32.PWSX-gen.17695.8177.exe 7 2->10         started        process3 file4 54 Multi AV Scanner detection for dropped file 7->54 56 Contains functionality to bypass UAC (CMSTPLUA) 7->56 58 Contains functionalty to change the wallpaper 7->58 66 5 other signatures 7->66 13 schtasks.exe 1 7->13         started        15 afUoHw.exe 7->15         started        38 C:\Users\user\AppData\Roaming\afUoHw.exe, PE32 10->38 dropped 40 C:\Users\user\AppData\Local\...\tmp1A2D.tmp, XML 10->40 dropped 60 Uses schtasks.exe or at.exe to add and modify task schedules 10->60 62 Adds a directory exclusion to Windows Defender 10->62 64 Injects a PE file into a foreign processes 10->64 17 SecuriteInfo.com.Win32.PWSX-gen.17695.8177.exe 3 2 10->17         started        22 powershell.exe 21 10->22         started        24 powershell.exe 21 10->24         started        26 2 other processes 10->26 signatures5 process6 dnsIp7 28 conhost.exe 13->28         started        42 167.114.189.33, 2404 OVHFR Canada 17->42 36 C:\ProgramData\remcos\logs.dat, data 17->36 dropped 52 Installs a global keyboard hook 17->52 30 conhost.exe 22->30         started        32 conhost.exe 24->32         started        34 conhost.exe 26->34         started        file8 signatures9 process10
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-09-25 18:38:06 UTC
File Type:
PE (.Net Exe)
Extracted files:
5
AV detection:
23 of 38 (60.53%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:remotehost rat
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Remcos
Malware Config
C2 Extraction:
167.114.189.33:2404
Unpacked files
SH256 hash:
c5e59e90be6bc0d060be2417eaf935f9543ef0b0cbf118745b7072bd2f998f0c
MD5 hash:
a53c5b131ec157e7f07f45ee60ef98c7
SHA1 hash:
f1963d6ca07ee1c52a79df598ecce3ce2485b695
SH256 hash:
513d832b6414ca92f71ea7abb910113140519f343c8fee079825d19bec37cae6
MD5 hash:
128feef2cd97a2ee0d369655ab39f214
SHA1 hash:
90d82fff31ca1510bdc670c400faa2893c918341
SH256 hash:
0c65cc63943ef047c4604d51017264cb699337750d110c3b9558c3b6d9b218d0
MD5 hash:
d3dbba0102a129dfd4009d5886d9f11b
SHA1 hash:
8e9a6b10047ba4e99e82a9b09bd79335830e74a6
Detections:
Remcos win_remcos_auto
SH256 hash:
abed99881ce1e05907653d1697ae232575d0cf067fd5cc646e2e5ee9f7337c82
MD5 hash:
491a7170bd8a7ed81d03a64ff2598bdf
SHA1 hash:
8325a5bccba80878a14032c06b78b34db808b910
SH256 hash:
4ff54bc771dc97403996794c50ded1a97b000c3f6eeff64afe3d049735e6bcdc
MD5 hash:
62304ab9ea09befcc17d78857c685533
SHA1 hash:
989d919493942e6da3809bf8c8c95945627797fe
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments