MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5b4b872f175ec2699fde6efb792e8efb2e16863d4f38d13408c390d776f103fa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 11


Intelligence 11 IOCs YARA 10 File information Comments

SHA256 hash: 5b4b872f175ec2699fde6efb792e8efb2e16863d4f38d13408c390d776f103fa
SHA3-384 hash: 153181eff613b39149bda2da757392ff9bcf76ade4f9890ae6efb4c6c4bee2f1a3221ac9212a00cb3110dc33c1cf7041
SHA1 hash: 30062aaf3d887f813c3511a60b2b0f76e5c9a32c
MD5 hash: 45d05dbdf04de74b537eef8de6298efe
humanhash: harry-winner-bakerloo-west
File name:QUOTATION MD20-2097.exe
Download: download sample
Signature RemcosRAT
File size:524'288 bytes
First seen:2020-11-30 19:42:47 UTC
Last seen:2020-11-30 21:51:41 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'661 x AgentTesla, 19'474 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 12288:8ZnUqXimrYdXxJwxutdTqpALgqb5w7FTaG:SUqX9Edhy8td8ALgqw7JaG
Threatray 1'190 similar samples on MalwareBazaar
TLSH 6BB42205BF619252D1DB173B6EA32701C3B3A12A757ADF5C31895B8EC9133A3C54AB22
Reporter James_inthe_box
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
145
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a window
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file
Creating a file in the Windows subdirectories
Creating a process with a hidden window
Deleting a recently created file
Running batch commands
Launching a process
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Result
Gathering data
Result
Threat name:
Remcos AgentTesla MicroClip
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Allocates memory in foreign processes
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Creates an autostart registry key pointing to binary in C:\Windows
Detected Remcos RAT
Detected unpacking (creates a PE file in dynamic memory)
Drops executables to the windows directory (C:\Windows) and starts them
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Suspicious Svchost Process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected AgentTesla
Yara detected MicroClip
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 324781 Sample: QUOTATION MD20-2097.exe Startdate: 30/11/2020 Architecture: WINDOWS Score: 100 71 g.msn.com 2->71 79 Malicious sample detected (through community Yara rule) 2->79 81 Multi AV Scanner detection for submitted file 2->81 83 Detected Remcos RAT 2->83 85 11 other signatures 2->85 14 QUOTATION MD20-2097.exe 3 6 2->14         started        17 msworrrd.exe 2->17         started        20 msworrrd.exe 2->20         started        signatures3 process4 file5 67 C:\Users\user\AppData\...\Rqctalaqztp4.exe, PE32 14->67 dropped 69 C:\Users\user\...\QUOTATION MD20-2097.exe.log, ASCII 14->69 dropped 22 QUOTATION MD20-2097.exe 1 5 14->22         started        26 wscript.exe 1 14->26         started        77 Drops executables to the windows directory (C:\Windows) and starts them 17->77 28 msworrrd.exe 17->28         started        30 msworrrd.exe 20->30         started        32 msworrrd.exe 20->32         started        34 msworrrd.exe 20->34         started        36 msworrrd.exe 20->36         started        signatures6 process7 file8 63 C:\Windows\SysWOW64\...\msworrrd.exe, PE32 22->63 dropped 65 C:\Windows\...\msworrrd.exe:Zone.Identifier, ASCII 22->65 dropped 93 Creates an autostart registry key pointing to binary in C:\Windows 22->93 38 wscript.exe 1 22->38         started        40 Rqctalaqztp4.exe 3 26->40         started        signatures9 process10 signatures11 43 cmd.exe 1 38->43         started        95 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 40->95 97 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 40->97 99 Injects a PE file into a foreign processes 40->99 45 Rqctalaqztp4.exe 40->45         started        process12 process13 47 msworrrd.exe 3 43->47         started        50 conhost.exe 43->50         started        signatures14 101 Multi AV Scanner detection for dropped file 47->101 103 Detected unpacking (creates a PE file in dynamic memory) 47->103 52 msworrrd.exe 47->52         started        process15 dnsIp16 73 89.249.74.213, 40511, 49736, 49737 M247GB United Kingdom 52->73 87 Writes to foreign memory regions 52->87 89 Allocates memory in foreign processes 52->89 91 Injects a PE file into a foreign processes 52->91 56 svchost.exe 52->56         started        signatures17 process18 process19 58 iexplore.exe 56->58         started        dnsIp20 75 192.168.2.1 unknown unknown 58->75 61 iexplore.exe 58->61         started        process21
Threat name:
ByteCode-MSIL.Backdoor.Remcos
Status:
Malicious
First seen:
2020-11-30 19:42:22 UTC
File Type:
PE (.Net Exe)
Extracted files:
12
AV detection:
32 of 48 (66.67%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos persistence rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Drops file in System32 directory
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
Remcos
Malware Config
C2 Extraction:
89.249.74.213:40511
Unpacked files
SH256 hash:
c80a968a3e92cdfc44a7e2ff7ae5cc4ee3b7a7eca08c74cba1a828d2b56322b0
MD5 hash:
6c5750e85ab70fbc1daa415cf067fc8f
SHA1 hash:
9220658534e06d0505e66bda6f6e9095202f9144
SH256 hash:
a8ce0bd251adc233cfdd2bc5ea5c757d1b52844f96eda61a549f04090ec3b117
MD5 hash:
4b8ab0d3a882a13f02a102f1016391b6
SHA1 hash:
500c2103cffb4bfb7eea727f2dbaece47f9806d9
SH256 hash:
d75d9c42778a607cb5cb2de6d7aefc5cc91f095dd946487d331776dfaf6302a3
MD5 hash:
ff528ffe55bfdbfdfc5069b51c96612f
SHA1 hash:
b6d1230a6852b8dfb865641f9d01da54fb77107b
Detections:
win_remcos_g0 win_remcos_auto
SH256 hash:
e054cd8a19cc1c552987c29c287aa097c503420098cbe0ecb4bee71d43b84a50
MD5 hash:
b50131317a3a2a707067d1616bc944b6
SHA1 hash:
e71859a6af5e10f21a8b487a30b7e5320461fa08
SH256 hash:
83c08f0721c8b0c96e3d6a8f3ccaf5c96fbcc427d574625c34424c3429fefaa1
MD5 hash:
3c5dbcc3bb27e913e14efd8054811373
SHA1 hash:
b0eba9388abddaef9d5aa49ccd5dbab2924cced0
SH256 hash:
bd457398e4753e1d9c040cac7b51fa7af36066670640325c9b1e317c1fc75ba3
MD5 hash:
7d19791047770ae05c08366d56559c17
SHA1 hash:
0676be53fb8daecb7f924ac3c26c58cf88de6b5d
SH256 hash:
5b4b872f175ec2699fde6efb792e8efb2e16863d4f38d13408c390d776f103fa
MD5 hash:
45d05dbdf04de74b537eef8de6298efe
SHA1 hash:
30062aaf3d887f813c3511a60b2b0f76e5c9a32c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_AgentTesla_20200929
Author:abuse.ch
Description:Detects AgentTesla PE
Rule name:ach_RemcosRAT
Author:abuse.ch
Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:Parallax
Author:@bartblaze
Description:Identifies Parallax RAT.
Rule name:Remcos
Author:JPCERT/CC Incident Response Group
Description:detect Remcos in memory
Rule name:remcos_rat
Author:jeFF0Falltrades
Rule name:REMCOS_RAT_variants
Rule name:win_agent_tesla_v1
Author:Johannes Bader @viql
Description:detects Agent Tesla
Rule name:win_remcos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments