MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 525b443dbb7b1db97acfc8532209e3ff21140c8681e90181e85ee31c1ce1fe16. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 8


Intelligence 8 IOCs YARA 7 File information Comments

SHA256 hash: 525b443dbb7b1db97acfc8532209e3ff21140c8681e90181e85ee31c1ce1fe16
SHA3-384 hash: 7a49d5232c8707fc755039804be0bfb754421202c7e5b62bc1644bd968bc5798c8504a383c800a1aebb5dca16e73fffd
SHA1 hash: 31e472b86c8f7150458b78d52f21f93071cc8849
MD5 hash: 2ed24524170f2ad3bd139a4e38e22399
humanhash: berlin-bluebird-grey-helium
File name:525b443dbb7b1db97acfc8532209e3ff21140c8681e90181e85ee31c1ce1fe16
Download: download sample
Signature RemcosRAT
File size:188'416 bytes
First seen:2020-11-14 17:50:32 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 30e2d15e6ca424bdb5848fe97e9852b6 (3 x RemcosRAT)
ssdeep 3072:0aIOpeKr1D6br1dy/g38UABdPtr2I8JTqSDHtPds50lMsUWgl:6OQKr1D624MUQdPt2fJuSDHlds8Ms
TLSH 9104E062A284D663E56853744EC295B860237E348E90CA47BD853F1FFA377C706A1B1F
Reporter seifreed
Tags:RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
74
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %AppData% directory
Setting a keyboard event handler
Connection attempt
Creating a file in the %AppData% subdirectories
Enabling the 'hidden' option for recently created files
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Remcos RAT
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Generic Dropper
Yara detected Remcos RAT
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.PonyStealer
Status:
Malicious
First seen:
2020-11-14 17:51:17 UTC
AV detection:
27 of 29 (93.10%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos rat
Behaviour
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of UnmapMainImage
Drops startup file
Remcos
Unpacked files
SH256 hash:
a034624d8ef40bd946919c3fc4df7f494591c8f85ef821849113a75f1f6d75ed
MD5 hash:
52e2f2e09a1b1d17db37d94ea3e2aa62
SHA1 hash:
ddc5b627efeed7ae9007effa926530064a416389
Detections:
win_remcos_g0 win_remcos_auto
SH256 hash:
525b443dbb7b1db97acfc8532209e3ff21140c8681e90181e85ee31c1ce1fe16
MD5 hash:
2ed24524170f2ad3bd139a4e38e22399
SHA1 hash:
31e472b86c8f7150458b78d52f21f93071cc8849
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer
Author:ditekSHen
Description:detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:Remcos
Author:JPCERT/CC Incident Response Group
Description:detect Remcos in memory
Rule name:remcos_rat
Author:jeFF0Falltrades
Rule name:REMCOS_RAT_variants
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments