MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 558fd95fee05249967ff348534e24cc85527e22fd723a45a46ff5411a598d2cd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RemcosRAT
Vendor detections: 5
| SHA256 hash: | 558fd95fee05249967ff348534e24cc85527e22fd723a45a46ff5411a598d2cd |
|---|---|
| SHA3-384 hash: | f634c34170fc6676dca31007f701b706117160b7965701db096a4fc09e7f62687f3c6a4bf5c85c74b672ce4ffcd6a505 |
| SHA1 hash: | dc42d81ec78fe0d2ea4b4cbb3b138055f8545f8c |
| MD5 hash: | 64f220f3df1749b5ba0b8312df37424e |
| humanhash: | artist-lithium-quebec-thirteen |
| File name: | 0000090900000020.pdf.xz |
| Download: | download sample |
| Signature | RemcosRAT |
| File size: | 86'779 bytes |
| First seen: | 2021-01-19 17:49:47 UTC |
| Last seen: | Never |
| File type: | zip |
| MIME type: | application/zip |
| ssdeep | 1536:z1XyWvamiL6wl4+whBoI/I5SKLD7gt9AxT9Gru6uHC2qWDQw1p8mUf6QJgU3wsIm:vvaH3i+wHoIIdJGS6uHPqWppHdnmV |
| TLSH | 25831204631D2BC21BEFCF944F5EF96AC673703263C32DA925AD92121775E6029EB0D6 |
| Reporter | |
| Tags: | RAT RemcosRAT xz |
abuse_ch
Malspam distributing RemcosRAT:HELO: hosted-by.rootlayer.net
Sending IP: 45.137.22.52
From: maxguibani@gmail.com
Subject: INVOICE
Attachment: 0000090900000020.pdf.xz (contains "0000090900000020.exe")
Intelligence
File Origin
# of uploads :
1
# of downloads :
218
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Zmutzy
Status:
Malicious
First seen:
2021-01-19 17:50:12 UTC
AV detection:
17 of 46 (36.96%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Kryptik
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
RemcosRAT
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.