MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 58d5e6849f56a08355256394531c49e55e2539e61c56da5ee0594cecd80a0142. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 15


Intelligence 15 IOCs 1 YARA 2 File information Comments

SHA256 hash: 58d5e6849f56a08355256394531c49e55e2539e61c56da5ee0594cecd80a0142
SHA3-384 hash: 8230a140449a0b7f4fc12664f4c718cc6604e5aabbb6561c707d7076e40ae91abfd32251a4a3bfd5491412db11ab10e3
SHA1 hash: 97fd6cf4573e9823fb99cf57e913fad2df9ac7ef
MD5 hash: c9c6ef483fc7bff718305b3c8e6a09f3
humanhash: angel-indigo-jig-mexico
File name:Payment transfer recipet returned copy.pdf.ex.exe
Download: download sample
Signature RemcosRAT
File size:1'884'848 bytes
First seen:2022-03-17 11:45:24 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'738 x AgentTesla, 19'596 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 49152:lc3XWYCvZgwabAS3u0Rd20YyGG09XmC2vu:lF/xXuTuuPAF9XmC2vu
TLSH T15F95E0E0F6508496FD690BB4A837CC2506677D79ACB0D21EB949B3B96F733D3002A50B
File icon (PE):PE icon
dhash icon ccc0d4c4ccccd4d4 (1 x RemcosRAT, 1 x NetWire)
Reporter abuse_ch
Tags:exe RAT RemcosRAT


Avatar
abuse_ch
RemcosRAT C2:
62.197.136.163:2404

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
62.197.136.163:2404 https://threatfox.abuse.ch/ioc/395809/

Intelligence


File Origin
# of uploads :
1
# of downloads :
261
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
Payment transfer recipet returned copy.pdf.ex.exe
Verdict:
Malicious activity
Analysis date:
2022-03-17 11:50:53 UTC
Tags:
rat remcos

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Launching a process
Creating a process with a hidden window
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
control.exe keylogger obfuscated overlay packed replace.exe shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Delayed program exit found
Detected unpacking (creates a PE file in dynamic memory)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious Add Scheduled Task From User AppData Temp
Sigma detected: Suspicious Svchost Process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM3
Yara detected Remcos RAT
Yara detected WebBrowserPassView password recovery tool
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 591127 Sample: Payment transfer recipet re... Startdate: 17/03/2022 Architecture: WINDOWS Score: 100 42 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->42 44 Malicious sample detected (through community Yara rule) 2->44 46 Multi AV Scanner detection for dropped file 2->46 48 21 other signatures 2->48 7 Payment transfer recipet returned copy.pdf.ex.exe 7 2->7         started        process3 file4 32 C:\Users\user\AppData\RoamingVsTOHog.exe, PE32 7->32 dropped 34 C:\Users\...VsTOHog.exe:Zone.Identifier, ASCII 7->34 dropped 36 C:\Users\user\AppData\Local\Temp\tmpD69.tmp, XML 7->36 dropped 38 Payment transfer r...copy.pdf.ex.exe.log, ASCII 7->38 dropped 56 Adds a directory exclusion to Windows Defender 7->56 58 Injects a PE file into a foreign processes 7->58 11 Payment transfer recipet returned copy.pdf.ex.exe 3 2 7->11         started        15 powershell.exe 25 7->15         started        17 schtasks.exe 1 7->17         started        signatures5 process6 dnsIp7 40 primetoolz.duckdns.org 62.197.136.163, 2404, 49808, 49810 SPRINTLINKUS Netherlands 11->40 60 Installs a global keyboard hook 11->60 62 Injects a PE file into a foreign processes 11->62 19 Payment transfer recipet returned copy.pdf.ex.exe 11->19         started        22 Payment transfer recipet returned copy.pdf.ex.exe 2 11->22         started        24 Payment transfer recipet returned copy.pdf.ex.exe 1 11->24         started        30 2 other processes 11->30 26 conhost.exe 15->26         started        28 conhost.exe 17->28         started        signatures8 process9 signatures10 50 Tries to steal Instant Messenger accounts or passwords 19->50 52 Tries to steal Mail credentials (via file / registry access) 19->52 54 Tries to harvest and steal browser information (history, passwords, etc) 22->54
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-03-17 11:46:19 UTC
File Type:
PE (.Net Exe)
Extracted files:
41
AV detection:
19 of 27 (70.37%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:remotehost brand:microsoft collection persistence phishing rat spyware stealer
Behaviour
Creates scheduled task(s)
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Detected potential entity reuse from brand microsoft.
Suspicious use of SetThreadContext
Accesses Microsoft Outlook accounts
Adds Run key to start application
Checks computer location settings
Reads user/profile data of web browsers
NirSoft MailPassView
NirSoft WebBrowserPassView
Nirsoft
Remcos
Malware Config
C2 Extraction:
primetoolz.duckdns.org:2404
Unpacked files
SH256 hash:
6ff21c090296e9fd3ec2b17e03e184e2396adf4013b2a4f4c9dea5bd7aff38f7
MD5 hash:
7c3fb3e3d91e338ae917c4cb46895e71
SHA1 hash:
ba577b8ccb3c6bbc5e9e3a838aec98859cd4dbaa
SH256 hash:
c37eb05531783d3a1d2ca04170dcfc57db1b6cc93ab235e3dec644939b250a21
MD5 hash:
dfa6d9331eeaba8e3c922d9e69b657af
SHA1 hash:
9d24be6b9534304a9c7c1bb954e4185d46eaf6f3
SH256 hash:
97235118b69f2d0916da8cec084bd3b4d26f8cbfea82d5fec43cdfdabf1695e4
MD5 hash:
900cc7563353de2860b3c2d1d08527a0
SHA1 hash:
94d0352471515c08ad4721ae76d33fb34dda469e
SH256 hash:
e3f773aeecd0175f8fced3179dc01ef341fddf2ee8479eb465edb76280a63e63
MD5 hash:
0f596946a2d351be7d8ed68d98fac665
SHA1 hash:
3353fb60d79c99553003418fef82e1ee811a226a
SH256 hash:
58d5e6849f56a08355256394531c49e55e2539e61c56da5ee0594cecd80a0142
MD5 hash:
c9c6ef483fc7bff718305b3c8e6a09f3
SHA1 hash:
97fd6cf4573e9823fb99cf57e913fad2df9ac7ef
Malware family:
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments