MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5251517c9a5cc925e00988f3d9aa30706271cfd0bd6d33d3794e03a92b13b946. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 15


Intelligence 15 IOCs YARA 2 File information Comments

SHA256 hash: 5251517c9a5cc925e00988f3d9aa30706271cfd0bd6d33d3794e03a92b13b946
SHA3-384 hash: 8c3144467150704cb9373a43fdab6c9c983f2786e5834034cf97f899d19f51d14ae0fb033f7810df2a4e64a62a82e09b
SHA1 hash: f795e9c5c7f08838535fdfbfd29ac80aeb5e3e28
MD5 hash: 2ded7062f4bf5e76c0d62cc805559e44
humanhash: alpha-october-eighteen-harry
File name:DHL Shipping Invoice PDF.exe
Download: download sample
Signature RemcosRAT
File size:987'136 bytes
First seen:2022-12-25 07:24:31 UTC
Last seen:2022-12-25 08:34:05 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'452 x Formbook, 12'201 x SnakeKeylogger)
ssdeep 24576:ALYJrBHX9eXpOhIv1TQJmlYNRI3ks4+FpT4ScHRQuqj3R7:AEJ13wYhkQAaNG0NwpEb1KR
Threatray 7'868 similar samples on MalwareBazaar
TLSH T17B25DFB7187B12D2CE6A0675C47A1D100D1DD8F90702C6B67AE3A2AFC6496CE79D4CB3
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter abuse_ch
Tags:DHL exe RAT RemcosRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
196
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
Artifacts-c52ae166-83a1-11ed-aabc-e8ee7f0e54a3-2022-12-24_17-14-41Z.zip
Verdict:
Malicious activity
Analysis date:
2022-12-24 17:15:21 UTC
Tags:
rat remcos keylogger

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Сreating synchronization primitives
Launching a process
Creating a process with a hidden window
Verdict:
No Threat
Threat level:
  2/10
Confidence:
100%
Tags:
packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Remcos
Sigma detected: Scheduled temp file as task from temp location
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM3
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 773461 Sample: DHL Shipping Invoice PDF.exe Startdate: 25/12/2022 Architecture: WINDOWS Score: 100 50 Multi AV Scanner detection for domain / URL 2->50 52 Malicious sample detected (through community Yara rule) 2->52 54 Antivirus detection for URL or domain 2->54 56 13 other signatures 2->56 7 DHL Shipping Invoice PDF.exe 7 2->7         started        11 GYSPyBLGE.exe 5 2->11         started        process3 file4 38 C:\Users\user\AppData\RoamingbehaviorgraphYSPyBLGE.exe, PE32 7->38 dropped 40 C:\Users\...behaviorgraphYSPyBLGE.exe:Zone.Identifier, ASCII 7->40 dropped 42 C:\Users\user\AppData\Local\...\tmp8F8B.tmp, XML 7->42 dropped 44 C:\Users\...\DHL Shipping Invoice PDF.exe.log, ASCII 7->44 dropped 58 Adds a directory exclusion to Windows Defender 7->58 13 DHL Shipping Invoice PDF.exe 2 2 7->13         started        18 powershell.exe 20 7->18         started        20 powershell.exe 21 7->20         started        28 2 other processes 7->28 60 Multi AV Scanner detection for dropped file 11->60 62 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 11->62 64 Machine Learning detection for dropped file 11->64 66 Injects a PE file into a foreign processes 11->66 22 schtasks.exe 1 11->22         started        24 GYSPyBLGE.exe 11->24         started        26 GYSPyBLGE.exe 11->26         started        signatures5 process6 dnsIp7 48 51.75.209.245, 2404 OVHFR France 13->48 46 C:\ProgramData\remcos\logs.dat, data 13->46 dropped 68 Installs a global keyboard hook 13->68 30 conhost.exe 18->30         started        32 conhost.exe 20->32         started        34 conhost.exe 22->34         started        36 conhost.exe 28->36         started        file8 signatures9 process10
Threat name:
ByteCode-MSIL.Trojan.CrypterX
Status:
Malicious
First seen:
2022-12-24 17:33:29 UTC
File Type:
PE (.Net Exe)
Extracted files:
13
AV detection:
19 of 26 (73.08%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:remotehost evasion rat
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Maps connected drives based on registry
Checks BIOS information in registry
Checks computer location settings
Looks for VMWare Tools registry key
Looks for VirtualBox Guest Additions in registry
Remcos
Malware Config
C2 Extraction:
51.75.209.245:2404
Unpacked files
SH256 hash:
ce37bc7dbcb25009583807bef07eacc8a79d2cf2d6c0a33e388b37bcb50957f1
MD5 hash:
5b5ec3c99bb0206ad4e28143c57ba3f0
SHA1 hash:
fd6f31c954b1a2fb6995268c4748599fa482d6f9
SH256 hash:
fc6485350cf55dc14ecbfd9b91b7a9979f61023b4104101e9f351caa6c73abaa
MD5 hash:
6c3fdb2b5d93cf814ea1b6ca05a0efcf
SHA1 hash:
f8ae5f9fa1c9b6b0e47b2f0873d2ee3373e0ebf5
SH256 hash:
1459ade80dd19b04b8d0037ce88f8f020b6c9d730e39fca181465355562f4b15
MD5 hash:
2c8b1b939947b35d647eb87373316fcb
SHA1 hash:
ec7b924e02076e3f6f1ba70d6990f7946c661d27
Detections:
Remcos win_remcos_auto
Parent samples :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 hash:
5c421a10ccb9a5a28a1513ebb96624419c3ace055207f6f4ba5fee90dbd0c8a4
MD5 hash:
ab6e9c68672f8aa6ccc9f0b7f818f1b7
SHA1 hash:
5b247b4a1a67b004e1e11c354b29d94d0e8ab668
SH256 hash:
474bcc9f9f87f80832eb7cf65846fa44528636dd23c9f8990c4568849efe74b8
MD5 hash:
e7308532f7f1f925a2a76510d21774ae
SHA1 hash:
0d506b221aab03a46040e407b1f2ee22088b4e3e
SH256 hash:
5251517c9a5cc925e00988f3d9aa30706271cfd0bd6d33d3794e03a92b13b946
MD5 hash:
2ded7062f4bf5e76c0d62cc805559e44
SHA1 hash:
f795e9c5c7f08838535fdfbfd29ac80aeb5e3e28
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments